0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x2}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:19 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3000) 09:17:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x68}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x186, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 574.390424][ T27] audit: type=1804 audit(1577179039.257:3989): pid=1268 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/552/bus" dev="sda1" ino=16787 res=1 09:17:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0xc000000, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:19 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3100) 09:17:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6c}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x68}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:19 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3000) [ 574.904035][ T27] audit: type=1804 audit(1577179039.767:3990): pid=1295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/553/bus" dev="sda1" ino=16689 res=1 09:17:19 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0xf6ffffff00000000, 0x0) 09:17:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6c}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 574.995204][ T27] audit: type=1804 audit(1577179039.867:3991): pid=1299 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir025275852/syzkaller.wmwV0T/338/bus" dev="sda1" ino=16929 res=1 [ 575.143576][ T27] audit: type=1804 audit(1577179040.007:3992): pid=1303 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir936088345/syzkaller.y1Dao2/331/bus" dev="sda1" ino=16578 res=1 09:17:20 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x74}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x74}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:20 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3200) 09:17:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x3000000, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 575.447461][ T27] audit: type=1804 audit(1577179040.317:3993): pid=1318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/554/bus" dev="sda1" ino=16994 res=1 09:17:20 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x6c00000000000000, 0x0) 09:17:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x7a}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7a}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0xfffffffe, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 575.751911][ T27] audit: type=1804 audit(1577179040.617:3994): pid=1331 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir025275852/syzkaller.wmwV0T/339/bus" dev="sda1" ino=16897 res=1 09:17:20 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3300) 09:17:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x300}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x186}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 576.072976][ T1345] device lo entered promiscuous mode [ 576.108185][ T1345] device tunl0 entered promiscuous mode [ 576.125064][ T1345] device gre0 entered promiscuous mode [ 576.130900][ T1345] device gretap0 entered promiscuous mode [ 576.149200][ T1345] device erspan0 entered promiscuous mode [ 576.162946][ T1345] device ip_vti0 entered promiscuous mode 09:17:21 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0xf0ffffff, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x500}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x2000, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 576.213961][ T1345] device ip6_vti0 entered promiscuous mode [ 576.225217][ T1345] device sit0 entered promiscuous mode [ 576.248496][ T1345] device ip6tnl0 entered promiscuous mode 09:17:21 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3400) [ 576.267022][ T1345] device ip6gre0 entered promiscuous mode [ 576.278607][ T1345] device syz_tun entered promiscuous mode [ 576.290069][ T1345] device ip6gretap0 entered promiscuous mode [ 576.333939][ T1345] device bridge0 entered promiscuous mode [ 576.348783][ T1345] device vcan0 entered promiscuous mode [ 576.356267][ T1345] device bond0 entered promiscuous mode [ 576.361961][ T1345] device bond_slave_0 entered promiscuous mode [ 576.368723][ T1345] device bond_slave_1 entered promiscuous mode [ 576.375515][ T1345] device team0 entered promiscuous mode [ 576.381287][ T1345] device team_slave_0 entered promiscuous mode [ 576.388113][ T1345] device team_slave_1 entered promiscuous mode [ 576.394723][ T1345] device dummy0 entered promiscuous mode [ 576.401025][ T1345] device nlmon0 entered promiscuous mode [ 576.407601][ T1345] device caif0 entered promiscuous mode [ 576.413425][ T1345] device batadv0 entered promiscuous mode [ 576.419821][ T1345] device vxcan0 entered promiscuous mode [ 576.425998][ T1345] device vxcan1 entered promiscuous mode [ 576.432006][ T1345] device veth0 entered promiscuous mode [ 576.438448][ T1345] device veth1 entered promiscuous mode [ 576.444195][ T1345] device veth0_to_bridge entered promiscuous mode [ 576.451376][ T1345] device veth1_to_bridge entered promiscuous mode [ 576.459208][ T1345] device veth0_to_bond entered promiscuous mode [ 576.466953][ T1345] device veth1_to_bond entered promiscuous mode [ 576.473475][ T1345] device veth0_to_team entered promiscuous mode [ 576.480766][ T1345] device veth1_to_team entered promiscuous mode [ 576.487678][ T1345] device veth0_to_hsr entered promiscuous mode [ 576.494083][ T1345] device veth1_to_hsr entered promiscuous mode [ 576.501108][ T1345] device hsr0 entered promiscuous mode [ 576.507536][ T1345] device veth2 entered promiscuous mode [ 576.513517][ T1345] device veth3 entered promiscuous mode [ 576.519582][ T1345] device veth4 entered promiscuous mode [ 576.525639][ T1345] device veth5 entered promiscuous mode 09:17:21 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3500) [ 576.531380][ T1345] device veth6 entered promiscuous mode [ 576.537720][ T1345] device veth7 entered promiscuous mode [ 576.544071][ T1345] device veth8 entered promiscuous mode [ 576.550490][ T1345] device veth9 entered promiscuous mode 09:17:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x186}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x600}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x4c000000, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 576.861567][ T1377] device lo entered promiscuous mode 09:17:21 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3600) [ 577.097406][ T1377] device tunl0 entered promiscuous mode 09:17:22 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 577.177453][ T1377] device gre0 entered promiscuous mode 09:17:22 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3700) [ 577.255349][ T1377] device gretap0 entered promiscuous mode 09:17:22 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3800) [ 577.382078][ T1377] device erspan0 entered promiscuous mode [ 577.501818][ T1377] device ip_vti0 entered promiscuous mode [ 577.573255][ T1377] device ip6_vti0 entered promiscuous mode 09:17:22 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3900) [ 577.676692][ T1377] device sit0 entered promiscuous mode 09:17:22 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3a00) [ 577.879661][ T1377] device ip6tnl0 entered promiscuous mode [ 577.990565][ T1377] device ip6gre0 entered promiscuous mode 09:17:22 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3b00) [ 578.100167][ T1377] device syz_tun entered promiscuous mode [ 578.210890][ T1377] device ip6gretap0 entered promiscuous mode 09:17:23 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3c00) [ 578.322377][ T1377] device bridge0 entered promiscuous mode [ 578.431295][ T1377] device vcan0 entered promiscuous mode [ 578.472101][ T1377] device bond0 entered promiscuous mode [ 578.480699][ T1377] device bond_slave_0 entered promiscuous mode [ 578.578412][ T1377] device team0 entered promiscuous mode [ 578.584101][ T1377] device team_slave_0 entered promiscuous mode [ 578.590721][ T1377] device team_slave_1 entered promiscuous mode [ 578.662540][ T1377] device dummy0 entered promiscuous mode [ 578.732846][ T1377] device nlmon0 entered promiscuous mode [ 578.768547][ T1377] device caif0 entered promiscuous mode [ 578.774595][ T1377] device batadv0 entered promiscuous mode [ 578.849607][ T1377] device vxcan0 entered promiscuous mode [ 578.876797][ T1377] device vxcan1 entered promiscuous mode [ 578.903877][ T1377] device veth0 entered promiscuous mode [ 578.975306][ T1377] device veth1 entered promiscuous mode [ 579.048771][ T1377] device veth0_to_bridge entered promiscuous mode [ 579.162046][ T1377] device veth1_to_bridge entered promiscuous mode [ 579.280698][ T1377] device veth0_to_bond entered promiscuous mode [ 579.376820][ T1377] device veth1_to_bond entered promiscuous mode [ 579.415347][ T1377] device bond_slave_1 entered promiscuous mode [ 579.455809][ T1377] device veth0_to_team entered promiscuous mode [ 579.572013][ T1377] device veth1_to_team entered promiscuous mode [ 579.687512][ T1377] device veth0_to_hsr entered promiscuous mode [ 579.807915][ T1377] device veth1_to_hsr entered promiscuous mode [ 579.922477][ T1377] device hsr0 entered promiscuous mode [ 579.992819][ T1377] device netdevsim0 entered promiscuous mode [ 580.061473][ T1377] device netdevsim1 entered promiscuous mode [ 580.110790][ T1377] device netdevsim2 entered promiscuous mode [ 580.159428][ T1377] device netdevsim3 entered promiscuous mode [ 580.192364][ T1377] device bridge1 entered promiscuous mode [ 580.198356][ T1377] device bridge2 entered promiscuous mode [ 580.204266][ T1377] device bridge3 entered promiscuous mode [ 580.213650][ T1377] device bond1 entered promiscuous mode [ 580.219947][ T1377] device veth2 entered promiscuous mode [ 580.228012][ T1377] device veth3 entered promiscuous mode [ 580.233618][ T1377] device veth4 entered promiscuous mode [ 580.239287][ T1377] device veth5 entered promiscuous mode [ 580.244859][ T1377] device veth6 entered promiscuous mode [ 580.253170][ T1377] device veth7 entered promiscuous mode 09:17:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x186}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 580.258881][ T1377] device veth8 entered promiscuous mode [ 580.264473][ T1377] device veth9 entered promiscuous mode [ 580.272444][ T1380] validate_nla: 25 callbacks suppressed [ 580.272454][ T1380] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:25 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3f00) [ 580.329966][ T1382] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 580.354992][ T1387] netlink: 'syz-executor.3': attribute type 16 has an invalid length. 09:17:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x600}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 580.413904][ T27] kauditd_printk_skb: 10 callbacks suppressed [ 580.413925][ T27] audit: type=1804 audit(1577179045.277:4005): pid=1538 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/565/bus" dev="sda1" ino=16610 res=1 [ 580.499050][ T1534] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 09:17:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x4c000000, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x700}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:25 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x2}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 580.584428][ T1542] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 580.614831][ T1542] device lo left promiscuous mode 09:17:25 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x2a00000000000000, 0x0) [ 580.638503][ T1542] device tunl0 left promiscuous mode 09:17:25 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x4000) [ 580.659916][ T1542] device gre0 left promiscuous mode [ 580.669457][ T1542] device gretap0 left promiscuous mode [ 580.692960][ T1542] device erspan0 left promiscuous mode [ 580.707179][ T1542] device ip_vti0 left promiscuous mode [ 580.721663][ T1542] device ip6_vti0 left promiscuous mode [ 580.747236][ T1542] device sit0 left promiscuous mode [ 580.752729][ T1542] device ip6tnl0 left promiscuous mode [ 580.759918][ T1542] device ip6gre0 left promiscuous mode [ 580.763662][ T27] audit: type=1804 audit(1577179045.637:4006): pid=1552 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir936088345/syzkaller.y1Dao2/337/bus" dev="sda1" ino=17089 res=1 [ 580.768470][ T1542] device syz_tun left promiscuous mode [ 580.799767][ T1542] device ip6gretap0 left promiscuous mode [ 580.806196][ T1542] device bridge0 left promiscuous mode [ 580.812174][ T1542] device vcan0 left promiscuous mode [ 580.820704][ T1542] device bond0 left promiscuous mode [ 580.826895][ T27] audit: type=1804 audit(1577179045.677:4007): pid=1558 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/566/bus" dev="sda1" ino=17153 res=1 [ 580.855671][ T1542] device team0 left promiscuous mode [ 580.861368][ T1542] device dummy0 left promiscuous mode [ 580.870636][ T1542] device nlmon0 left promiscuous mode [ 580.876584][ T1542] device caif0 left promiscuous mode [ 580.882059][ T1542] device batadv0 left promiscuous mode [ 580.891182][ T1542] device vxcan0 left promiscuous mode [ 580.897007][ T1542] device vxcan1 left promiscuous mode [ 580.902565][ T1542] device veth0 left promiscuous mode [ 580.911544][ T1542] device veth1 left promiscuous mode [ 580.917289][ T1542] device veth0_to_bridge left promiscuous mode [ 580.923860][ T1542] device veth1_to_bridge left promiscuous mode [ 580.933810][ T1542] device veth0_to_bond left promiscuous mode [ 580.940849][ T1542] device bond_slave_0 left promiscuous mode [ 580.950522][ T1542] device veth1_to_bond left promiscuous mode [ 580.957131][ T1542] device bond_slave_1 left promiscuous mode [ 580.963246][ T1542] device veth0_to_team left promiscuous mode [ 580.972722][ T1542] device team_slave_0 left promiscuous mode [ 580.979161][ T1542] device veth1_to_team left promiscuous mode [ 580.989099][ T1542] device team_slave_1 left promiscuous mode [ 580.995464][ T1542] device veth0_to_hsr left promiscuous mode [ 581.001647][ T1542] device veth1_to_hsr left promiscuous mode 09:17:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x6000, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:25 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x4800) [ 581.011799][ T1542] device hsr0 left promiscuous mode [ 581.017430][ T1542] device veth2 left promiscuous mode [ 581.023027][ T1542] device veth3 left promiscuous mode [ 581.032928][ T1542] device veth4 left promiscuous mode [ 581.038805][ T1542] device veth5 left promiscuous mode [ 581.044347][ T1542] device veth6 left promiscuous mode [ 581.054432][ T1542] device veth7 left promiscuous mode 09:17:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x700}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 581.060501][ T1542] device veth8 left promiscuous mode [ 581.079039][ T1542] device veth9 left promiscuous mode [ 581.084677][ T1546] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 581.183247][ T27] audit: type=1804 audit(1577179046.047:4008): pid=1566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/567/bus" dev="sda1" ino=16658 res=1 [ 581.210244][ T1549] netlink: 'syz-executor.3': attribute type 16 has an invalid length. 09:17:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xa00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 581.347316][ T1572] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 581.379996][ T1564] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 09:17:26 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x4c00) 09:17:26 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x1400000000000000, 0x0) 09:17:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xc00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 581.416867][ T1569] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 581.437905][ T1569] device lo entered promiscuous mode [ 581.475109][ T1569] device tunl0 entered promiscuous mode [ 581.480890][ T1569] device gre0 entered promiscuous mode 09:17:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0xc, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 581.516106][ T1569] device gretap0 entered promiscuous mode 09:17:26 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x2}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 581.577863][ T1569] device erspan0 entered promiscuous mode [ 581.583755][ T1569] device ip_vti0 entered promiscuous mode [ 581.604901][ T27] audit: type=1804 audit(1577179046.467:4009): pid=1583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/568/bus" dev="sda1" ino=16881 res=1 [ 581.627835][ T1569] device ip6_vti0 entered promiscuous mode [ 581.669152][ T27] audit: type=1804 audit(1577179046.477:4010): pid=1581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir025275852/syzkaller.wmwV0T/343/bus" dev="sda1" ino=16787 res=1 [ 581.698782][ T1569] device sit0 entered promiscuous mode [ 581.708133][ T1569] device ip6tnl0 entered promiscuous mode [ 581.714111][ T1569] device ip6gre0 entered promiscuous mode [ 581.720433][ T1569] device syz_tun entered promiscuous mode [ 581.726541][ T1569] device ip6gretap0 entered promiscuous mode [ 581.732748][ T1569] device bridge0 entered promiscuous mode [ 581.739100][ T1569] device vcan0 entered promiscuous mode [ 581.745870][ T1569] device bond0 entered promiscuous mode [ 581.752874][ T1569] device bond_slave_0 entered promiscuous mode [ 581.760648][ T1569] device bond_slave_1 entered promiscuous mode [ 581.767772][ T1569] device team0 entered promiscuous mode [ 581.773495][ T1569] device team_slave_0 entered promiscuous mode [ 581.780237][ T1569] device team_slave_1 entered promiscuous mode [ 581.786935][ T1569] device dummy0 entered promiscuous mode [ 581.792764][ T1569] device nlmon0 entered promiscuous mode [ 581.799521][ T1569] device caif0 entered promiscuous mode [ 581.806434][ T1569] device batadv0 entered promiscuous mode [ 581.812385][ T1569] device vxcan0 entered promiscuous mode [ 581.821733][ T1569] device vxcan1 entered promiscuous mode [ 581.830929][ T1569] device veth0 entered promiscuous mode [ 581.840047][ T1569] device veth1 entered promiscuous mode [ 581.846806][ T1569] device veth0_to_bridge entered promiscuous mode [ 581.861110][ T1569] device veth1_to_bridge entered promiscuous mode 09:17:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfffffff0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:26 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x6800) [ 581.872297][ T1569] device veth0_to_bond entered promiscuous mode [ 581.883554][ T1569] device veth1_to_bond entered promiscuous mode [ 581.897382][ T1569] device veth0_to_team entered promiscuous mode [ 581.911850][ T1569] device veth1_to_team entered promiscuous mode [ 581.950363][ T1569] device veth0_to_hsr entered promiscuous mode [ 581.972460][ T1569] device veth1_to_hsr entered promiscuous mode [ 581.979682][ T1569] device hsr0 entered promiscuous mode [ 581.995724][ T1569] device veth2 entered promiscuous mode [ 582.001722][ T1569] device veth3 entered promiscuous mode [ 582.007370][ T27] audit: type=1804 audit(1577179046.867:4011): pid=1597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/569/bus" dev="sda1" ino=16787 res=1 [ 582.033084][ T1569] device veth4 entered promiscuous mode [ 582.039328][ T1569] device veth5 entered promiscuous mode [ 582.045518][ T1569] device veth6 entered promiscuous mode [ 582.051659][ T1569] device veth7 entered promiscuous mode [ 582.058056][ T1569] device veth8 entered promiscuous mode [ 582.063926][ T1569] device veth9 entered promiscuous mode 09:17:27 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x6c00) 09:17:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x811, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 582.246734][ T27] audit: type=1804 audit(1577179047.117:4012): pid=1602 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/570/bus" dev="sda1" ino=16787 res=1 09:17:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xe00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 582.307484][ T1606] device lo left promiscuous mode [ 582.356098][ T1606] device tunl0 left promiscuous mode [ 582.361692][ T1606] device gre0 left promiscuous mode [ 582.367395][ T1606] device gretap0 left promiscuous mode [ 582.373142][ T1606] device erspan0 left promiscuous mode 09:17:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xb43b0000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 582.402941][ T1606] device ip_vti0 left promiscuous mode [ 582.418061][ T1606] device ip6_vti0 left promiscuous mode [ 582.425533][ T1606] device sit0 left promiscuous mode [ 582.438510][ T1606] device ip6tnl0 left promiscuous mode 09:17:27 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x7400) [ 582.468299][ T1606] device ip6gre0 left promiscuous mode [ 582.482990][ T1606] device syz_tun left promiscuous mode [ 582.493904][ T1606] device ip6gretap0 left promiscuous mode [ 582.500136][ T1606] device bridge0 left promiscuous mode 09:17:27 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x2}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 582.523133][ T1606] device vcan0 left promiscuous mode [ 582.533200][ T1606] device bond0 left promiscuous mode [ 582.545285][ T1606] device team0 left promiscuous mode [ 582.557840][ T1606] device dummy0 left promiscuous mode [ 582.570116][ T1606] device nlmon0 left promiscuous mode [ 582.584563][ T1606] device caif0 left promiscuous mode [ 582.592031][ T1606] device batadv0 left promiscuous mode [ 582.593209][ T27] audit: type=1804 audit(1577179047.457:4013): pid=1618 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/571/bus" dev="sda1" ino=16673 res=1 [ 582.599129][ T1606] device vxcan0 left promiscuous mode [ 582.644129][ T1606] device vxcan1 left promiscuous mode [ 582.658346][ T1606] device veth0 left promiscuous mode [ 582.663927][ T1606] device veth1 left promiscuous mode [ 582.672971][ T1606] device veth0_to_bridge left promiscuous mode [ 582.680108][ T1606] device veth1_to_bridge left promiscuous mode 09:17:27 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x7a00) [ 582.690010][ T1606] device veth0_to_bond left promiscuous mode [ 582.696483][ T1606] device bond_slave_0 left promiscuous mode [ 582.702626][ T1606] device veth1_to_bond left promiscuous mode [ 582.713392][ T1606] device bond_slave_1 left promiscuous mode [ 582.719964][ T1606] device veth0_to_team left promiscuous mode [ 582.729359][ T1606] device team_slave_0 left promiscuous mode [ 582.735865][ T1606] device veth1_to_team left promiscuous mode [ 582.742033][ T1606] device team_slave_1 left promiscuous mode [ 582.753385][ T1606] device veth0_to_hsr left promiscuous mode [ 582.762400][ T1606] device veth1_to_hsr left promiscuous mode [ 582.775182][ T1606] device hsr0 left promiscuous mode [ 582.780682][ T1606] device veth2 left promiscuous mode [ 582.790148][ T1606] device veth3 left promiscuous mode [ 582.796001][ T1606] device veth4 left promiscuous mode [ 582.801154][ T27] audit: type=1804 audit(1577179047.667:4014): pid=1626 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/572/bus" dev="sda1" ino=16673 res=1 [ 582.801461][ T1606] device veth5 left promiscuous mode [ 582.835476][ T1606] device veth6 left promiscuous mode [ 582.841060][ T1606] device veth7 left promiscuous mode [ 582.850221][ T1606] device veth8 left promiscuous mode [ 582.856971][ T1606] device veth9 left promiscuous mode 09:17:27 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x400000000000000, 0x0) 09:17:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x2000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:28 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xff00) 09:17:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x3bb4}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:28 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:28 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xff0f) 09:17:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:28 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x208200) 09:17:28 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x822000) 09:17:29 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1000000) 09:17:29 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2000000) 09:17:29 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3000000) 09:17:29 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x4000000) 09:17:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 586.485334][ T1653] validate_nla: 11 callbacks suppressed [ 586.485368][ T1653] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 586.508002][ T1654] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 586.649035][ T1663] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 586.662809][ T1663] device lo left promiscuous mode [ 586.670198][ T1663] device tunl0 left promiscuous mode [ 586.676445][ T1663] device gre0 left promiscuous mode [ 586.682012][ T1663] device gretap0 left promiscuous mode [ 586.688186][ T1663] device erspan0 left promiscuous mode [ 586.711170][ T1663] device ip_vti0 left promiscuous mode [ 586.717415][ T1663] device ip6_vti0 left promiscuous mode [ 586.723314][ T1663] device sit0 left promiscuous mode [ 586.729181][ T1663] device ip6tnl0 left promiscuous mode [ 586.743399][ T1663] device ip6gre0 left promiscuous mode [ 586.749273][ T1663] device syz_tun left promiscuous mode [ 586.754800][ T1663] device ip6gretap0 left promiscuous mode [ 586.760851][ T1663] device bridge0 left promiscuous mode [ 586.766517][ T1663] device vcan0 left promiscuous mode [ 586.771834][ T1663] device bond0 left promiscuous mode [ 586.777969][ T1663] device team0 left promiscuous mode [ 586.783551][ T1663] device dummy0 left promiscuous mode [ 586.789517][ T1663] device nlmon0 left promiscuous mode [ 586.795492][ T1663] device caif0 left promiscuous mode [ 586.800955][ T1663] device batadv0 left promiscuous mode [ 586.806766][ T1663] device vxcan0 left promiscuous mode [ 586.812149][ T1663] device vxcan1 left promiscuous mode [ 586.818652][ T1663] device veth0 left promiscuous mode [ 586.823963][ T1663] device veth1 left promiscuous mode [ 586.829915][ T1663] device veth0_to_bridge left promiscuous mode [ 586.836389][ T1663] device veth1_to_bridge left promiscuous mode [ 586.842659][ T1663] device veth0_to_bond left promiscuous mode [ 586.848759][ T1663] device bond_slave_0 left promiscuous mode [ 586.854739][ T1663] device veth1_to_bond left promiscuous mode [ 586.860900][ T1663] device bond_slave_1 left promiscuous mode [ 586.867166][ T1663] device veth0_to_team left promiscuous mode [ 586.873208][ T1663] device team_slave_0 left promiscuous mode [ 586.879215][ T1663] device veth1_to_team left promiscuous mode [ 586.885609][ T1663] device team_slave_1 left promiscuous mode [ 586.891619][ T1663] device veth0_to_hsr left promiscuous mode [ 586.897717][ T1663] device veth1_to_hsr left promiscuous mode [ 586.903731][ T1663] device hsr0 left promiscuous mode [ 586.909025][ T1663] device netdevsim0 left promiscuous mode [ 586.914821][ T1663] device netdevsim1 left promiscuous mode [ 586.920943][ T1663] device netdevsim2 left promiscuous mode [ 586.927196][ T1663] device netdevsim3 left promiscuous mode [ 586.933081][ T1663] device bridge1 left promiscuous mode [ 586.938769][ T1663] device bridge2 left promiscuous mode [ 586.944284][ T1663] device bridge3 left promiscuous mode [ 586.950332][ T1663] device bond1 left promiscuous mode [ 586.955889][ T1663] device veth2 left promiscuous mode [ 586.961265][ T1663] device veth3 left promiscuous mode [ 586.966804][ T1663] device veth4 left promiscuous mode [ 586.972201][ T1663] device veth5 left promiscuous mode [ 586.978029][ T1663] device veth6 left promiscuous mode [ 586.983381][ T1663] device veth7 left promiscuous mode [ 586.988797][ T1663] device veth8 left promiscuous mode [ 586.994169][ T1663] device veth9 left promiscuous mode [ 586.999923][ T1809] netlink: 'syz-executor.3': attribute type 16 has an invalid length. 09:17:31 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:31 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x5000000) [ 587.011704][ T1811] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 587.028780][ T1815] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x74000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4800}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 587.136516][ T27] kauditd_printk_skb: 9 callbacks suppressed [ 587.136537][ T27] audit: type=1804 audit(1577179052.007:4024): pid=1817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/581/bus" dev="sda1" ino=16578 res=1 09:17:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4800}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 587.244914][ T1825] netlink: 'syz-executor.3': attribute type 16 has an invalid length. [ 587.265898][ T1829] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 587.280265][ T1830] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:17:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4c00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:32 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x100000000000000, 0x0) [ 587.400486][ T1834] netlink: 'syz-executor.3': attribute type 16 has an invalid length. 09:17:32 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x6000000) 09:17:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4c000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4c00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 587.646045][ T27] audit: type=1804 audit(1577179052.517:4025): pid=1843 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir936088345/syzkaller.y1Dao2/344/bus" dev="sda1" ino=16594 res=1 [ 587.749387][ T27] audit: type=1804 audit(1577179052.597:4026): pid=1852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/582/bus" dev="sda1" ino=16881 res=1 09:17:32 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5865}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x5865}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:32 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xa000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:32 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x7000000) [ 588.076466][ T27] audit: type=1804 audit(1577179052.947:4027): pid=1866 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/583/bus" dev="sda1" ino=16755 res=1 [ 588.098037][ T1860] 8021q: adding VLAN 0 to HW filter on device bond0 [ 588.154182][ T1860] 8021q: adding VLAN 0 to HW filter on device team0 09:17:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x8000000) [ 588.215202][ T1860] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:17:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 588.306087][ T27] audit: type=1804 audit(1577179053.177:4028): pid=1880 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/584/bus" dev="sda1" ino=16525 res=1 09:17:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:17:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x8020000) [ 588.596903][ T27] audit: type=1804 audit(1577179053.467:4029): pid=1895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/585/bus" dev="sda1" ino=16722 res=1 09:17:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x9000000) [ 588.782301][ T27] audit: type=1804 audit(1577179053.647:4030): pid=1900 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/586/bus" dev="sda1" ino=16722 res=1 09:17:33 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="44040000240007050000", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xa000000) [ 589.040808][ T27] audit: type=1804 audit(1577179053.907:4031): pid=1904 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/587/bus" dev="sda1" ino=16706 res=1 09:17:34 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xb000000) 09:17:34 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x9000000) 09:17:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6558}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 589.412403][ T27] audit: type=1804 audit(1577179054.277:4032): pid=1914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/588/bus" dev="sda1" ino=16546 res=1 09:17:34 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x3a000000, 0x0) 09:17:34 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xc000000) [ 589.489511][ T2021] device lo entered promiscuous mode [ 589.502009][ T27] audit: type=1804 audit(1577179054.367:4033): pid=2019 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir936088345/syzkaller.y1Dao2/346/bus" dev="sda1" ino=16961 res=1 [ 589.515008][ T2021] device tunl0 entered promiscuous mode 09:17:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6558}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 589.561749][ T2021] device gre0 entered promiscuous mode [ 589.578019][ T2021] device gretap0 entered promiscuous mode [ 589.593985][ T2021] device erspan0 entered promiscuous mode [ 589.618411][ T2021] device ip_vti0 entered promiscuous mode [ 589.633062][ T2021] device ip6_vti0 entered promiscuous mode [ 589.651925][ T2021] device sit0 entered promiscuous mode [ 589.674141][ T2021] device ip6tnl0 entered promiscuous mode [ 589.707507][ T2021] device ip6gre0 entered promiscuous mode [ 589.713530][ T2021] device syz_tun entered promiscuous mode [ 589.720800][ T2021] device ip6gretap0 entered promiscuous mode [ 589.739639][ T2021] device bridge0 entered promiscuous mode [ 589.749240][ T2021] device vcan0 entered promiscuous mode [ 589.755371][ T2021] device bond0 entered promiscuous mode [ 589.761115][ T2021] device bond_slave_0 entered promiscuous mode [ 589.771027][ T2021] device bond_slave_1 entered promiscuous mode [ 589.778073][ T2021] device team0 entered promiscuous mode [ 589.783922][ T2021] device team_slave_0 entered promiscuous mode [ 589.793925][ T2021] device team_slave_1 entered promiscuous mode [ 589.801119][ T2021] device dummy0 entered promiscuous mode [ 589.810861][ T2021] device nlmon0 entered promiscuous mode [ 589.817207][ T2021] device caif0 entered promiscuous mode [ 589.823036][ T2021] device batadv0 entered promiscuous mode [ 589.832519][ T2021] device vxcan0 entered promiscuous mode [ 589.838684][ T2021] device vxcan1 entered promiscuous mode [ 589.844663][ T2021] device veth0 entered promiscuous mode [ 589.853624][ T2021] device veth1 entered promiscuous mode [ 589.859928][ T2021] device veth0_to_bridge entered promiscuous mode 09:17:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3bb4, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:34 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="44040000240007050000", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 589.869981][ T2021] device veth1_to_bridge entered promiscuous mode [ 589.877222][ T2021] device veth0_to_bond entered promiscuous mode [ 589.883971][ T2021] device veth1_to_bond entered promiscuous mode [ 589.901740][ T2021] device veth0_to_team entered promiscuous mode [ 589.916214][ T2021] device veth1_to_team entered promiscuous mode [ 589.932238][ T2021] device veth0_to_hsr entered promiscuous mode [ 589.943022][ T2021] device veth1_to_hsr entered promiscuous mode [ 589.952911][ T2021] device hsr0 entered promiscuous mode 09:17:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 589.990034][ T2021] device veth2 entered promiscuous mode [ 590.001459][ T2021] device veth3 entered promiscuous mode [ 590.018516][ T2021] device veth4 entered promiscuous mode 09:17:34 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xd000000) [ 590.037153][ T2021] device veth5 entered promiscuous mode [ 590.042937][ T2021] device veth6 entered promiscuous mode [ 590.068145][ T2021] device veth7 entered promiscuous mode [ 590.080678][ T2021] device veth8 entered promiscuous mode [ 590.086650][ T2021] device veth9 entered promiscuous mode 09:17:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6800}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6800}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 590.265050][ T2048] device lo left promiscuous mode 09:17:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfffffffe, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x500, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 590.287305][ T2048] device tunl0 left promiscuous mode [ 590.306201][ T2048] device gre0 left promiscuous mode [ 590.312675][ T2048] device gretap0 left promiscuous mode [ 590.319119][ T2048] device erspan0 left promiscuous mode [ 590.324794][ T2048] device ip_vti0 left promiscuous mode [ 590.330681][ T2048] device ip6_vti0 left promiscuous mode [ 590.339359][ T2048] device sit0 left promiscuous mode [ 590.344857][ T2048] device ip6tnl0 left promiscuous mode [ 590.350814][ T2048] device ip6gre0 left promiscuous mode [ 590.363313][ T2048] device syz_tun left promiscuous mode [ 590.377721][ T2048] device ip6gretap0 left promiscuous mode [ 590.412333][ T2048] device bridge0 left promiscuous mode [ 590.427193][ T2048] device vcan0 left promiscuous mode [ 590.432739][ T2048] device bond0 left promiscuous mode [ 590.442201][ T2048] device team0 left promiscuous mode [ 590.448677][ T2048] device dummy0 left promiscuous mode [ 590.454637][ T2048] device nlmon0 left promiscuous mode [ 590.465982][ T2048] device caif0 left promiscuous mode [ 590.474699][ T2048] device batadv0 left promiscuous mode [ 590.480941][ T2048] device vxcan0 left promiscuous mode [ 590.487742][ T2048] device vxcan1 left promiscuous mode [ 590.493304][ T2048] device veth0 left promiscuous mode [ 590.499676][ T2048] device veth1 left promiscuous mode [ 590.505524][ T2048] device veth0_to_bridge left promiscuous mode 09:17:35 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xe000000) [ 590.511930][ T2048] device veth1_to_bridge left promiscuous mode [ 590.519780][ T2048] device veth0_to_bond left promiscuous mode [ 590.526220][ T2048] device bond_slave_0 left promiscuous mode [ 590.532414][ T2048] device veth1_to_bond left promiscuous mode [ 590.538920][ T2048] device bond_slave_1 left promiscuous mode [ 590.545367][ T2048] device veth0_to_team left promiscuous mode [ 590.551567][ T2048] device team_slave_0 left promiscuous mode [ 590.558049][ T2048] device veth1_to_team left promiscuous mode [ 590.568270][ T2048] device team_slave_1 left promiscuous mode [ 590.574477][ T2048] device veth0_to_hsr left promiscuous mode [ 590.581367][ T2048] device veth1_to_hsr left promiscuous mode [ 590.590905][ T2048] device hsr0 left promiscuous mode [ 590.596573][ T2048] device veth2 left promiscuous mode [ 590.602073][ T2048] device veth3 left promiscuous mode [ 590.611401][ T2048] device veth4 left promiscuous mode [ 590.617229][ T2048] device veth5 left promiscuous mode [ 590.622675][ T2048] device veth6 left promiscuous mode [ 590.631657][ T2048] device veth7 left promiscuous mode [ 590.637454][ T2048] device veth8 left promiscuous mode [ 590.642986][ T2048] device veth9 left promiscuous mode 09:17:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6c00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:35 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xf000000) 09:17:35 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xe000000) 09:17:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x9effffff, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:35 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="44040000240007050000", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6c00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7400}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x9effffff, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x7400}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x88a8ffff, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7a00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:36 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x10000000) 09:17:36 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x2f000000, 0x0) 09:17:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x7a00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8100}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 591.628535][ T2106] validate_nla: 24 callbacks suppressed [ 591.628548][ T2106] netlink: 'syz-executor.3': attribute type 16 has an invalid length. [ 591.718314][ T2111] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 591.767070][ T2112] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 591.784141][ T2112] device lo entered promiscuous mode [ 591.814653][ T2112] device tunl0 entered promiscuous mode [ 591.823167][ T2112] device gre0 entered promiscuous mode [ 591.842514][ T2112] device gretap0 entered promiscuous mode 09:17:36 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500000000000000", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:36 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x11000000) [ 591.860548][ T2112] device erspan0 entered promiscuous mode [ 591.869683][ T2112] device ip_vti0 entered promiscuous mode [ 591.875571][ T2112] device ip6_vti0 entered promiscuous mode 09:17:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8100}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 591.914739][ T2112] device sit0 entered promiscuous mode [ 591.921764][ T2112] device ip6tnl0 entered promiscuous mode [ 591.929743][ T2112] device ip6gre0 entered promiscuous mode [ 591.936558][ T2112] device syz_tun entered promiscuous mode [ 591.942511][ T2112] device ip6gretap0 entered promiscuous mode 09:17:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 591.960970][ T2112] device bridge0 entered promiscuous mode [ 591.967279][ T2112] device vcan0 entered promiscuous mode [ 591.972971][ T2112] device bond0 entered promiscuous mode [ 591.981676][ T2112] device bond_slave_0 entered promiscuous mode [ 592.015118][ T2112] device bond_slave_1 entered promiscuous mode [ 592.031288][ T2112] device team0 entered promiscuous mode [ 592.038316][ T2112] device team_slave_0 entered promiscuous mode [ 592.048247][ T2112] device team_slave_1 entered promiscuous mode [ 592.054778][ T2112] device dummy0 entered promiscuous mode [ 592.063446][ T2112] device nlmon0 entered promiscuous mode [ 592.074666][ T2112] device caif0 entered promiscuous mode [ 592.080679][ T2112] device batadv0 entered promiscuous mode [ 592.090615][ T2112] device vxcan0 entered promiscuous mode [ 592.096509][ T2112] device vxcan1 entered promiscuous mode [ 592.102406][ T2112] device veth0 entered promiscuous mode [ 592.111545][ T2112] device veth1 entered promiscuous mode [ 592.117347][ T2112] device veth0_to_bridge entered promiscuous mode [ 592.124120][ T2112] device veth1_to_bridge entered promiscuous mode [ 592.134753][ T2112] device veth0_to_bond entered promiscuous mode [ 592.141386][ T2112] device veth1_to_bond entered promiscuous mode [ 592.151170][ T2112] device veth0_to_team entered promiscuous mode [ 592.157786][ T2112] device veth1_to_team entered promiscuous mode 09:17:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x12000000) [ 592.164324][ T2112] device veth0_to_hsr entered promiscuous mode [ 592.174528][ T2112] device veth1_to_hsr entered promiscuous mode [ 592.181476][ T2112] device hsr0 entered promiscuous mode [ 592.190306][ T2112] device veth2 entered promiscuous mode [ 592.196114][ T2112] device veth3 entered promiscuous mode [ 592.201994][ T2112] device veth4 entered promiscuous mode [ 592.211013][ T2112] device veth5 entered promiscuous mode [ 592.216774][ T2112] device veth6 entered promiscuous mode [ 592.222630][ T2112] device veth7 entered promiscuous mode [ 592.232388][ T2112] device veth8 entered promiscuous mode [ 592.238295][ T2112] device veth9 entered promiscuous mode [ 592.244217][ T2118] netlink: 'syz-executor.3': attribute type 16 has an invalid length. 09:17:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8601}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 592.262890][ T2122] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 592.279417][ T27] kauditd_printk_skb: 9 callbacks suppressed [ 592.279520][ T27] audit: type=1804 audit(1577179057.147:4043): pid=2135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/595/bus" dev="sda1" ino=16947 res=1 09:17:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xb43b}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 592.434299][ T2140] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 592.477209][ T2140] device lo left promiscuous mode [ 592.494620][ T2140] device tunl0 left promiscuous mode [ 592.515720][ T2140] device gre0 left promiscuous mode [ 592.521652][ T2140] device gretap0 left promiscuous mode [ 592.545584][ T2140] device erspan0 left promiscuous mode [ 592.551794][ T2140] device ip_vti0 left promiscuous mode [ 592.564746][ T2140] device ip6_vti0 left promiscuous mode [ 592.579492][ T2140] device sit0 left promiscuous mode [ 592.585704][ T2140] device ip6tnl0 left promiscuous mode 09:17:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x13000000) [ 592.592083][ T2140] device ip6gre0 left promiscuous mode [ 592.598707][ T2140] device syz_tun left promiscuous mode [ 592.605206][ T2140] device ip6gretap0 left promiscuous mode [ 592.611948][ T2140] device bridge0 left promiscuous mode [ 592.621163][ T2140] device vcan0 left promiscuous mode [ 592.628273][ T2140] device bond0 left promiscuous mode [ 592.634404][ T2140] 8021q: adding VLAN 0 to HW filter on device bond0 [ 592.643718][ T2140] device team0 left promiscuous mode [ 592.650784][ T2140] 8021q: adding VLAN 0 to HW filter on device team0 [ 592.660143][ T2140] device dummy0 left promiscuous mode [ 592.666634][ T2140] device nlmon0 left promiscuous mode [ 592.689294][ T27] audit: type=1804 audit(1577179057.557:4044): pid=2148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/596/bus" dev="sda1" ino=16947 res=1 [ 592.715076][ T2140] device caif0 left promiscuous mode [ 592.720535][ T2140] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 592.754999][ T2141] netlink: 'syz-executor.3': attribute type 16 has an invalid length. [ 592.764730][ T2144] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x14000000) 09:17:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:37 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="00000000ffffff"], 0x2}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:37 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500000000000000", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:37 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x16000000, 0x0) [ 593.023721][ T27] audit: type=1804 audit(1577179057.887:4045): pid=2158 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/597/bus" dev="sda1" ino=16947 res=1 [ 593.059612][ T2162] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 593.159197][ T27] audit: type=1804 audit(1577179058.027:4046): pid=2168 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir936088345/syzkaller.y1Dao2/352/bus" dev="sda1" ino=16526 res=1 09:17:38 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x15000000) 09:17:38 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x10000000, 0x0) [ 593.454674][ T27] audit: type=1804 audit(1577179058.317:4047): pid=2179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/598/bus" dev="sda1" ino=17217 res=1 [ 593.513901][ T27] audit: type=1804 audit(1577179058.337:4048): pid=2178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir936088345/syzkaller.y1Dao2/353/bus" dev="sda1" ino=17089 res=1 09:17:38 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x16000000) [ 593.588850][ T27] audit: type=1804 audit(1577179058.457:4049): pid=2180 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/598/bus" dev="sda1" ino=17217 res=1 09:17:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 593.690939][ T27] audit: type=1804 audit(1577179058.557:4050): pid=2183 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/599/bus" dev="sda1" ino=17217 res=1 09:17:38 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x17000000) [ 593.977268][ T27] audit: type=1804 audit(1577179058.847:4051): pid=2291 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/600/bus" dev="sda1" ino=17089 res=1 [ 594.093414][ T2162] device batadv0 left promiscuous mode [ 594.100380][ T2162] device vxcan0 left promiscuous mode [ 594.106258][ T2162] device vxcan1 left promiscuous mode [ 594.111768][ T2162] device veth0 left promiscuous mode [ 594.117519][ T2162] device veth1 left promiscuous mode [ 594.122929][ T2162] device veth0_to_bridge left promiscuous mode [ 594.129689][ T2162] device veth1_to_bridge left promiscuous mode [ 594.136380][ T2162] device veth0_to_bond left promiscuous mode 09:17:39 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x18000000) [ 594.142505][ T2162] device bond_slave_0 left promiscuous mode [ 594.148807][ T2162] device veth1_to_bond left promiscuous mode [ 594.155500][ T2162] device bond_slave_1 left promiscuous mode [ 594.161600][ T2162] device veth0_to_team left promiscuous mode [ 594.168123][ T2162] device team_slave_0 left promiscuous mode [ 594.174180][ T2162] device veth1_to_team left promiscuous mode [ 594.180571][ T2162] device team_slave_1 left promiscuous mode [ 594.186857][ T2162] device veth0_to_hsr left promiscuous mode [ 594.193033][ T2162] device veth1_to_hsr left promiscuous mode [ 594.199371][ T2162] device hsr0 left promiscuous mode [ 594.205343][ T2162] device veth2 left promiscuous mode [ 594.210843][ T2162] device veth3 left promiscuous mode [ 594.216553][ T2162] device veth4 left promiscuous mode [ 594.222037][ T2162] device veth5 left promiscuous mode [ 594.227887][ T2162] device veth6 left promiscuous mode [ 594.233277][ T2162] device veth7 left promiscuous mode [ 594.239101][ T2162] device veth8 left promiscuous mode [ 594.244446][ T27] audit: type=1804 audit(1577179059.107:4052): pid=2295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/601/bus" dev="sda1" ino=17089 res=1 [ 594.269685][ T2162] device veth9 left promiscuous mode 09:17:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 594.296418][ T2163] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:17:39 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500000000000000", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:39 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x6000000, 0x0) 09:17:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:39 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x19000000) 09:17:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:40 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1a000000) 09:17:40 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1b000000) 09:17:40 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1a000000) 09:17:40 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1c000000) 09:17:40 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x19000000) 09:17:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:42 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1d000000) [ 597.930297][ T2313] validate_nla: 3 callbacks suppressed [ 597.930307][ T2313] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 597.969457][ T2323] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 09:17:42 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/18, @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r2}) sendmmsg$inet(r3, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:17:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 598.006787][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 598.006807][ T27] audit: type=1804 audit(1577179062.877:4060): pid=2448 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/606/bus" dev="sda1" ino=16552 res=1 [ 598.069379][ T2451] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:43 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1e000000) [ 598.168065][ T2451] 8021q: adding VLAN 0 to HW filter on device bond0 [ 598.186844][ T2451] 8021q: adding VLAN 0 to HW filter on device team0 [ 598.265480][ T2451] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:17:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 598.313408][ T2457] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 598.338163][ T27] audit: type=1804 audit(1577179063.207:4061): pid=2467 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/607/bus" dev="sda1" ino=16552 res=1 [ 598.384989][ T2461] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 598.400750][ T2469] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:43 executing program 0 (fault-call:5 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:17:43 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1f000000) [ 598.623986][ T27] audit: type=1804 audit(1577179063.487:4062): pid=2479 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/608/bus" dev="sda1" ino=16552 res=1 [ 598.656353][ T2481] FAULT_INJECTION: forcing a failure. [ 598.656353][ T2481] name failslab, interval 1, probability 0, space 0, times 0 [ 598.698156][ T2481] CPU: 0 PID: 2481 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 598.706817][ T2481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.716867][ T2481] Call Trace: [ 598.720194][ T2481] dump_stack+0x11d/0x181 [ 598.724570][ T2481] should_fail.cold+0xa/0x1a [ 598.729268][ T2481] __should_failslab+0xee/0x130 [ 598.734133][ T2481] should_failslab+0x9/0x14 [ 598.738662][ T2481] kmem_cache_alloc_node+0x39/0x660 [ 598.743986][ T2481] ? ima_get_action+0x6e/0x80 [ 598.748669][ T2481] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 598.754600][ T2481] __alloc_skb+0x8e/0x360 [ 598.759082][ T2481] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 598.764994][ T2481] kcm_sendmsg+0x1234/0x1485 [ 598.769618][ T2481] ? aa_sk_perm+0x1d3/0x590 [ 598.774151][ T2481] ? apparmor_socket_sendmsg+0x3b/0x50 [ 598.779650][ T2481] ? kcm_tx_work+0xe0/0xe0 [ 598.784084][ T2481] sock_sendmsg+0x9f/0xc0 [ 598.788433][ T2481] ____sys_sendmsg+0x212/0x4d0 [ 598.793271][ T2481] ___sys_sendmsg+0xb5/0x100 [ 598.797881][ T2481] ? __fget+0xb8/0x1d0 [ 598.802053][ T2481] ? __fget_light+0xaf/0x190 [ 598.806701][ T2481] ? __fdget+0x2c/0x40 [ 598.810781][ T2481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 598.811316][ T27] audit: type=1804 audit(1577179063.567:4063): pid=2484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/609/bus" dev="sda1" ino=16552 res=1 [ 598.817030][ T2481] __sys_sendmmsg+0x123/0x350 [ 598.817099][ T2481] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 598.817129][ T2481] ? fput_many+0xec/0x130 [ 598.856931][ T2481] ? fput+0x29/0x30 [ 598.860829][ T2481] ? ksys_write+0x145/0x1b0 [ 598.865365][ T2481] __x64_sys_sendmmsg+0x64/0x80 [ 598.870253][ T2481] do_syscall_64+0xcc/0x3a0 [ 598.874812][ T2481] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 598.880987][ T2481] RIP: 0033:0x45a919 [ 598.884981][ T2481] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 598.904588][ T2481] RSP: 002b:00007f93a01b5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 598.913403][ T2481] RAX: ffffffffffffffda RBX: 00007f93a01b5c90 RCX: 000000000045a919 [ 598.921530][ T2481] RDX: 0000000000002f81 RSI: 0000000020000e80 RDI: 0000000000000005 [ 598.929591][ T2481] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 598.937643][ T2481] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93a01b66d4 09:17:43 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x20000000) 09:17:43 executing program 3 (fault-call:8 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) [ 598.945704][ T2481] R13: 00000000004c927d R14: 00000000004e0fd0 R15: 0000000000000006 09:17:43 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/18, @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:43 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x21000000) [ 599.119664][ T2493] FAULT_INJECTION: forcing a failure. [ 599.119664][ T2493] name failslab, interval 1, probability 0, space 0, times 0 [ 599.133007][ T2493] CPU: 1 PID: 2493 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 599.141675][ T2493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.151733][ T2493] Call Trace: [ 599.155065][ T2493] dump_stack+0x11d/0x181 [ 599.159428][ T2493] should_fail.cold+0xa/0x1a [ 599.164093][ T2493] __should_failslab+0xee/0x130 [ 599.168960][ T2493] should_failslab+0x9/0x14 [ 599.173482][ T2493] kmem_cache_alloc_node+0x39/0x660 [ 599.178690][ T2493] ? ima_get_action+0x6e/0x80 [ 599.183427][ T2493] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 599.189419][ T2493] __alloc_skb+0x8e/0x360 [ 599.193771][ T2493] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 599.199678][ T2493] kcm_sendmsg+0x1234/0x1485 [ 599.204286][ T2493] ? aa_sk_perm+0x1d3/0x590 [ 599.208890][ T2493] ? apparmor_socket_sendmsg+0x3b/0x50 [ 599.214359][ T2493] ? kcm_tx_work+0xe0/0xe0 [ 599.218882][ T2493] sock_sendmsg+0x9f/0xc0 [ 599.224135][ T2493] ____sys_sendmsg+0x212/0x4d0 [ 599.229096][ T2493] ___sys_sendmsg+0xb5/0x100 [ 599.233705][ T2493] ? __fget+0xb8/0x1d0 [ 599.237793][ T2493] ? __fget_light+0xaf/0x190 [ 599.242450][ T2493] ? __fdget+0x2c/0x40 [ 599.246528][ T2493] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 599.252776][ T2493] __sys_sendmmsg+0x123/0x350 [ 599.257534][ T2493] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 599.263776][ T2493] ? fput_many+0xec/0x130 [ 599.268115][ T2493] ? fput+0x29/0x30 [ 599.271932][ T2493] ? ksys_write+0x145/0x1b0 [ 599.276514][ T2493] __x64_sys_sendmmsg+0x64/0x80 [ 599.281377][ T2493] do_syscall_64+0xcc/0x3a0 [ 599.285922][ T2493] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 599.291833][ T2493] RIP: 0033:0x45a919 [ 599.295771][ T2493] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 599.315429][ T2493] RSP: 002b:00007faedd5d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 599.320756][ T27] audit: type=1804 audit(1577179064.097:4064): pid=2563 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/610/bus" dev="sda1" ino=17297 res=1 [ 599.323846][ T2493] RAX: ffffffffffffffda RBX: 00007faedd5d4c90 RCX: 000000000045a919 [ 599.323857][ T2493] RDX: 0000000000000001 RSI: 0000000020000e80 RDI: 0000000000000007 09:17:44 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x22000000) 09:17:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 599.323883][ T2493] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 599.372561][ T2493] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faedd5d56d4 [ 599.380534][ T2493] R13: 00000000004c927d R14: 00000000004e0fd0 R15: 0000000000000008 [ 599.529908][ T27] audit: type=1804 audit(1577179064.397:4065): pid=2617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/611/bus" dev="sda1" ino=17297 res=1 09:17:44 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x23000000) [ 600.011922][ T27] audit: type=1804 audit(1577179064.877:4066): pid=2621 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/612/bus" dev="sda1" ino=17297 res=1 [ 600.058109][ T2474] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:17:45 executing program 3 (fault-call:8 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:17:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x591e9a4}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:45 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/18, @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 600.329634][ T2627] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:45 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x24000000) [ 600.410808][ T2627] 8021q: adding VLAN 0 to HW filter on device bond0 [ 600.433586][ T2627] 8021q: adding VLAN 0 to HW filter on device team0 [ 600.480068][ T2643] FAULT_INJECTION: forcing a failure. [ 600.480068][ T2643] name failslab, interval 1, probability 0, space 0, times 0 [ 600.498627][ T2643] CPU: 0 PID: 2643 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 600.507245][ T2643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 600.517294][ T2643] Call Trace: [ 600.517324][ T2643] dump_stack+0x11d/0x181 [ 600.517383][ T2643] should_fail.cold+0xa/0x1a [ 600.517411][ T2643] __should_failslab+0xee/0x130 [ 600.534436][ T2643] should_failslab+0x9/0x14 [ 600.536222][ T2627] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 600.538948][ T2643] kmem_cache_alloc_node_trace+0x3b/0x670 [ 600.539036][ T2643] ? memcg_kmem_put_cache+0x7c/0xc0 [ 600.539067][ T2643] __kmalloc_node_track_caller+0x38/0x50 [ 600.571009][ T2643] __kmalloc_reserve.isra.0+0x49/0xd0 [ 600.576425][ T2643] __alloc_skb+0xc2/0x360 [ 600.580836][ T2643] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 600.586956][ T2643] kcm_sendmsg+0x1234/0x1485 [ 600.591556][ T2643] ? aa_sk_perm+0x1d3/0x590 [ 600.596073][ T2643] ? apparmor_socket_sendmsg+0x3b/0x50 [ 600.601531][ T2643] ? kcm_tx_work+0xe0/0xe0 [ 600.605956][ T2643] sock_sendmsg+0x9f/0xc0 [ 600.609031][ T2633] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 600.610317][ T2643] ____sys_sendmsg+0x212/0x4d0 [ 600.610347][ T2643] ___sys_sendmsg+0xb5/0x100 [ 600.627830][ T2643] ? __fget+0xb8/0x1d0 [ 600.631467][ T2633] device lo entered promiscuous mode [ 600.631934][ T2643] ? __fget_light+0xaf/0x190 [ 600.631962][ T2643] ? __fdget+0x2c/0x40 [ 600.646006][ T2643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 600.652265][ T2643] __sys_sendmmsg+0x123/0x350 [ 600.657062][ T2643] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 600.657961][ T2633] device tunl0 entered promiscuous mode [ 600.663314][ T2643] ? fput_many+0xec/0x130 [ 600.663331][ T2643] ? fput+0x29/0x30 [ 600.663351][ T2643] ? ksys_write+0x145/0x1b0 [ 600.663435][ T2643] __x64_sys_sendmmsg+0x64/0x80 [ 600.686588][ T2643] do_syscall_64+0xcc/0x3a0 [ 600.691115][ T2643] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 600.697007][ T2643] RIP: 0033:0x45a919 [ 600.700910][ T2643] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 600.708667][ T2633] device gre0 entered promiscuous mode 09:17:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 600.720526][ T2643] RSP: 002b:00007faedd5d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 600.720546][ T2643] RAX: ffffffffffffffda RBX: 00007faedd5d4c90 RCX: 000000000045a919 [ 600.720555][ T2643] RDX: 0000000000000001 RSI: 0000000020000e80 RDI: 0000000000000007 [ 600.720574][ T2643] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 600.758366][ T2643] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faedd5d56d4 [ 600.766343][ T2643] R13: 00000000004c927d R14: 00000000004e0fd0 R15: 0000000000000008 [ 600.778267][ T27] audit: type=1804 audit(1577179065.367:4067): pid=2644 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/613/bus" dev="sda1" ino=17297 res=1 [ 600.790500][ T2633] device gretap0 entered promiscuous mode [ 600.825138][ T2633] device erspan0 entered promiscuous mode [ 600.846329][ T2633] device ip_vti0 entered promiscuous mode [ 600.859853][ T2633] device ip6_vti0 entered promiscuous mode [ 600.888339][ T2633] device sit0 entered promiscuous mode [ 600.901108][ T2633] device ip6tnl0 entered promiscuous mode [ 600.907410][ T2633] device ip6gre0 entered promiscuous mode [ 600.913481][ T2633] device syz_tun entered promiscuous mode [ 600.922768][ T2633] device ip6gretap0 entered promiscuous mode [ 600.929293][ T2633] device bridge0 entered promiscuous mode 09:17:45 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x25000000) [ 600.938256][ T2633] device vcan0 entered promiscuous mode [ 600.944151][ T2633] device bond0 entered promiscuous mode [ 600.949839][ T2633] device bond_slave_0 entered promiscuous mode [ 600.975231][ T2633] device bond_slave_1 entered promiscuous mode [ 600.981732][ T2633] device team0 entered promiscuous mode [ 601.009063][ T2633] device team_slave_0 entered promiscuous mode [ 601.035248][ T2633] device team_slave_1 entered promiscuous mode [ 601.059924][ T2633] device dummy0 entered promiscuous mode [ 601.066096][ T27] audit: type=1804 audit(1577179065.937:4068): pid=2652 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/614/bus" dev="sda1" ino=17297 res=1 [ 601.097067][ T2633] device nlmon0 entered promiscuous mode [ 601.109563][ T2633] device caif0 entered promiscuous mode [ 601.123363][ T2633] device batadv0 entered promiscuous mode [ 601.138071][ T2633] device vxcan0 entered promiscuous mode [ 601.152647][ T2633] device vxcan1 entered promiscuous mode [ 601.166193][ T2633] device veth0 entered promiscuous mode [ 601.179973][ T2633] device veth1 entered promiscuous mode [ 601.194618][ T2633] device veth0_to_bridge entered promiscuous mode [ 601.209217][ T2633] device veth1_to_bridge entered promiscuous mode 09:17:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x11, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 601.219558][ T2633] device veth0_to_bond entered promiscuous mode [ 601.233295][ T2633] device veth1_to_bond entered promiscuous mode [ 601.247433][ T2633] device veth0_to_team entered promiscuous mode [ 601.262918][ T2633] device veth1_to_team entered promiscuous mode 09:17:46 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x26000000) [ 601.297952][ T2633] device veth0_to_hsr entered promiscuous mode [ 601.304409][ T2633] device veth1_to_hsr entered promiscuous mode [ 601.338134][ T2633] device hsr0 entered promiscuous mode [ 601.343750][ T2633] device veth2 entered promiscuous mode [ 601.356787][ T2633] device veth3 entered promiscuous mode [ 601.362568][ T2633] device veth4 entered promiscuous mode [ 601.368302][ T2633] device veth5 entered promiscuous mode [ 601.374047][ T2633] device veth6 entered promiscuous mode [ 601.379855][ T2633] device veth7 entered promiscuous mode [ 601.385611][ T2633] device veth8 entered promiscuous mode [ 601.391786][ T27] audit: type=1804 audit(1577179066.257:4069): pid=2663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/615/bus" dev="sda1" ino=16578 res=1 [ 601.420685][ T2633] device veth9 entered promiscuous mode [ 601.435711][ T2648] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:46 executing program 3 (fault-call:8 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:17:46 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:46 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x27000000) [ 601.685932][ T2695] FAULT_INJECTION: forcing a failure. [ 601.685932][ T2695] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 601.730384][ T2695] CPU: 0 PID: 2695 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 601.739027][ T2695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.749084][ T2695] Call Trace: [ 601.752387][ T2695] dump_stack+0x11d/0x181 [ 601.756822][ T2695] should_fail.cold+0xa/0x1a [ 601.761426][ T2695] should_fail_alloc_page+0x50/0x60 [ 601.766628][ T2695] __alloc_pages_nodemask+0xd2/0x310 [ 601.771980][ T2695] alloc_pages_current+0xd1/0x170 [ 601.777035][ T2695] skb_page_frag_refill+0x16f/0x260 [ 601.782324][ T2695] ? __write_once_size+0x5a/0xe0 [ 601.787283][ T2695] sk_page_frag_refill+0x57/0x170 [ 601.792322][ T2695] kcm_sendmsg+0x72c/0x1485 [ 601.796849][ T2695] ? aa_sk_perm+0x1d3/0x590 [ 601.801437][ T2695] ? kcm_tx_work+0xe0/0xe0 [ 601.805877][ T2695] sock_sendmsg+0x9f/0xc0 [ 601.810253][ T2695] ____sys_sendmsg+0x212/0x4d0 [ 601.815057][ T2695] ___sys_sendmsg+0xb5/0x100 [ 601.819684][ T2695] ? __fget+0xb8/0x1d0 [ 601.823768][ T2695] ? __fget_light+0xaf/0x190 [ 601.828368][ T2695] ? __fdget+0x2c/0x40 [ 601.832438][ T2695] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 601.838729][ T2695] __sys_sendmmsg+0x123/0x350 [ 601.843434][ T2695] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 601.849669][ T2695] ? fput_many+0xec/0x130 [ 601.854074][ T2695] ? fput+0x29/0x30 [ 601.857906][ T2695] ? ksys_write+0x145/0x1b0 [ 601.862524][ T2695] __x64_sys_sendmmsg+0x64/0x80 [ 601.867383][ T2695] do_syscall_64+0xcc/0x3a0 [ 601.871908][ T2695] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 601.877858][ T2695] RIP: 0033:0x45a919 [ 601.881767][ T2695] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 601.901431][ T2695] RSP: 002b:00007faedd5d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 601.909882][ T2695] RAX: ffffffffffffffda RBX: 00007faedd5d4c90 RCX: 000000000045a919 [ 601.917874][ T2695] RDX: 0000000000000001 RSI: 0000000020000e80 RDI: 0000000000000007 [ 601.925868][ T2695] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 601.933839][ T2695] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faedd5d56d4 [ 601.941840][ T2695] R13: 00000000004c927d R14: 00000000004e0fd0 R15: 0000000000000008 09:17:46 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x28000000) 09:17:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x34000, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:17:47 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x29000000) 09:17:47 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2a000000) [ 602.995003][ T2669] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 603.014089][ T2669] device lo left promiscuous mode [ 603.031749][ T2669] device tunl0 left promiscuous mode 09:17:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:47 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2b000000) [ 603.055068][ T2669] device gre0 left promiscuous mode 09:17:47 executing program 3 (fault-call:8 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) [ 603.105087][ T2669] device gretap0 left promiscuous mode [ 603.111096][ T2669] device erspan0 left promiscuous mode [ 603.134506][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 603.134528][ T27] audit: type=1804 audit(1577179067.997:4074): pid=2812 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/620/bus" dev="sda1" ino=16554 res=1 [ 603.142794][ T2669] device ip_vti0 left promiscuous mode [ 603.221752][ T2669] device ip6_vti0 left promiscuous mode [ 603.249246][ T2669] device sit0 left promiscuous mode [ 603.257935][ T2669] device ip6tnl0 left promiscuous mode 09:17:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x2}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 603.271928][ T2669] device ip6gre0 left promiscuous mode [ 603.281334][ T2669] device syz_tun left promiscuous mode [ 603.298711][ T2669] device ip6gretap0 left promiscuous mode [ 603.334701][ T2669] device bridge0 left promiscuous mode [ 603.356816][ T2669] device vcan0 left promiscuous mode [ 603.365947][ T2669] device bond0 left promiscuous mode [ 603.371679][ T2669] device team0 left promiscuous mode [ 603.385703][ T2669] device dummy0 left promiscuous mode [ 603.397903][ T2669] device nlmon0 left promiscuous mode [ 603.408986][ T2669] device caif0 left promiscuous mode [ 603.421012][ T2669] device batadv0 left promiscuous mode [ 603.433271][ T2669] device vxcan0 left promiscuous mode [ 603.446540][ T2669] device vxcan1 left promiscuous mode [ 603.454160][ T2669] device veth0 left promiscuous mode [ 603.472304][ T2669] device veth1 left promiscuous mode [ 603.496826][ T2669] device veth0_to_bridge left promiscuous mode [ 603.510132][ T2669] device veth1_to_bridge left promiscuous mode [ 603.532020][ T2669] device veth0_to_bond left promiscuous mode [ 603.538508][ T2669] device bond_slave_0 left promiscuous mode [ 603.544561][ T2669] device veth1_to_bond left promiscuous mode [ 603.551052][ T2669] device bond_slave_1 left promiscuous mode [ 603.557603][ T2669] device veth0_to_team left promiscuous mode [ 603.563852][ T2669] device team_slave_0 left promiscuous mode [ 603.570732][ T2669] device veth1_to_team left promiscuous mode [ 603.577267][ T2669] device team_slave_1 left promiscuous mode [ 603.583397][ T2669] device veth0_to_hsr left promiscuous mode [ 603.589959][ T2669] device veth1_to_hsr left promiscuous mode [ 603.596500][ T2669] device hsr0 left promiscuous mode [ 603.602001][ T2669] device veth2 left promiscuous mode [ 603.608178][ T2669] device veth3 left promiscuous mode [ 603.613769][ T2669] device veth4 left promiscuous mode [ 603.619705][ T2669] device veth5 left promiscuous mode [ 603.625563][ T2669] device veth6 left promiscuous mode [ 603.631108][ T2669] device veth7 left promiscuous mode [ 603.637214][ T2669] device veth8 left promiscuous mode [ 603.642888][ T2669] device veth9 left promiscuous mode [ 603.668129][ T2819] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:48 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2c000000) 09:17:48 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 603.719347][ T2819] 8021q: adding VLAN 0 to HW filter on device bond0 [ 603.757162][ T2819] 8021q: adding VLAN 0 to HW filter on device team0 [ 603.807445][ T27] audit: type=1804 audit(1577179068.677:4075): pid=2831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/621/bus" dev="sda1" ino=16554 res=1 [ 603.877895][ T2819] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 603.912545][ T2834] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:17:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) [ 604.113611][ T2842] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 604.155249][ T2848] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:49 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2d000000) 09:17:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x18000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 604.295077][ T27] audit: type=1804 audit(1577179069.157:4076): pid=2855 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/622/bus" dev="sda1" ino=16553 res=1 09:17:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:49 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2e000000) [ 604.611489][ T27] audit: type=1804 audit(1577179069.477:4077): pid=2867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/623/bus" dev="sda1" ino=16553 res=1 09:17:49 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x3}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:49 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2f000000) [ 604.902961][ T27] audit: type=1804 audit(1577179069.767:4078): pid=2873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/624/bus" dev="sda1" ino=16553 res=1 09:17:50 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x30000000) [ 605.220463][ T27] audit: type=1804 audit(1577179070.087:4079): pid=2980 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/625/bus" dev="sda1" ino=16553 res=1 09:17:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x20000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:17:50 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x31000000) [ 605.524384][ T27] audit: type=1804 audit(1577179070.387:4080): pid=2993 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/626/bus" dev="sda1" ino=16553 res=1 [ 605.581370][ T2864] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:17:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:17:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:50 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 605.821245][ T3001] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 605.858094][ T3003] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:50 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x32000000) 09:17:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 605.985795][ T27] audit: type=1804 audit(1577179070.857:4081): pid=3010 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/627/bus" dev="sda1" ino=16580 res=1 09:17:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 606.093082][ T3015] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:17:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x28000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 606.229841][ T3022] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:51 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x33000000) 09:17:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 606.434160][ T27] audit: type=1804 audit(1577179071.297:4082): pid=3032 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/628/bus" dev="sda1" ino=16580 res=1 09:17:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:17:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x48}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x48000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:51 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4c}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4c000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:51 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x34000000) 09:17:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 607.150533][ T27] audit: type=1804 audit(1577179072.017:4083): pid=3067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/629/bus" dev="sda1" ino=16548 res=1 09:17:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x30000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:17:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x68}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6c}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:17:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x65580000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:52 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x35000000) 09:17:52 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x74}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x68000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7a}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 608.021671][ T3111] validate_nla: 13 callbacks suppressed [ 608.021682][ T3111] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 608.050930][ T3112] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6c000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 608.191724][ T3115] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:17:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x33f00}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:17:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:53 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x36000000) 09:17:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x74000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 608.358750][ T3126] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 608.373532][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 608.373607][ T27] audit: type=1804 audit(1577179073.237:4085): pid=3127 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/631/bus" dev="sda1" ino=16540 res=1 [ 608.430759][ T3125] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 608.460669][ T3125] device lo entered promiscuous mode [ 608.492544][ T3125] device tunl0 entered promiscuous mode [ 608.515156][ T3125] device gre0 entered promiscuous mode [ 608.530943][ T3125] device gretap0 entered promiscuous mode [ 608.546900][ T3125] device erspan0 entered promiscuous mode [ 608.558478][ T3125] device ip_vti0 entered promiscuous mode [ 608.578795][ T3125] device ip6_vti0 entered promiscuous mode [ 608.625077][ T3125] device sit0 entered promiscuous mode [ 608.630617][ T3125] device ip6tnl0 entered promiscuous mode [ 608.645261][ T3125] device ip6gre0 entered promiscuous mode [ 608.652489][ T3125] device syz_tun entered promiscuous mode [ 608.658944][ T3125] device ip6gretap0 entered promiscuous mode [ 608.666029][ T3125] device bridge0 entered promiscuous mode [ 608.672080][ T3125] device vcan0 entered promiscuous mode [ 608.678446][ T3125] device bond0 entered promiscuous mode [ 608.684336][ T3125] device bond_slave_0 entered promiscuous mode [ 608.691141][ T3125] device bond_slave_1 entered promiscuous mode [ 608.698050][ T3125] device team0 entered promiscuous mode [ 608.703855][ T3125] device team_slave_0 entered promiscuous mode [ 608.710923][ T3125] device team_slave_1 entered promiscuous mode [ 608.726175][ T3125] device dummy0 entered promiscuous mode [ 608.732162][ T3125] device nlmon0 entered promiscuous mode [ 608.762987][ T3125] device caif0 entered promiscuous mode [ 608.768835][ T3125] device batadv0 entered promiscuous mode [ 608.774610][ T3125] device vxcan0 entered promiscuous mode [ 608.780575][ T3125] device vxcan1 entered promiscuous mode [ 608.786613][ T3125] device veth0 entered promiscuous mode [ 608.792343][ T3125] device veth1 entered promiscuous mode [ 608.798107][ T3125] device veth0_to_bridge entered promiscuous mode [ 608.804743][ T3125] device veth1_to_bridge entered promiscuous mode [ 608.811470][ T3125] device veth0_to_bond entered promiscuous mode [ 608.818346][ T3125] device veth1_to_bond entered promiscuous mode [ 608.824795][ T3125] device veth0_to_team entered promiscuous mode [ 608.831380][ T3125] device veth1_to_team entered promiscuous mode [ 608.837892][ T3125] device veth0_to_hsr entered promiscuous mode [ 608.844227][ T3125] device veth1_to_hsr entered promiscuous mode [ 608.850752][ T3125] device hsr0 entered promiscuous mode [ 608.856479][ T3125] device netdevsim0 entered promiscuous mode [ 608.862514][ T3125] device netdevsim1 entered promiscuous mode [ 608.868799][ T3125] device netdevsim2 entered promiscuous mode [ 608.874884][ T3125] device netdevsim3 entered promiscuous mode [ 608.881149][ T3125] device wlan0 entered promiscuous mode [ 608.886905][ T3125] device wlan1 entered promiscuous mode [ 608.892564][ T3125] device vti0 entered promiscuous mode [ 608.898381][ T3125] device vti1 entered promiscuous mode [ 608.903920][ T3125] device vti2 entered promiscuous mode [ 608.909628][ T3125] device veth2 entered promiscuous mode [ 608.915369][ T3125] device veth3 entered promiscuous mode 09:17:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x20c, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:17:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7a000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:53 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x37000000) 09:17:53 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:17:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 609.003599][ T27] audit: type=1804 audit(1577179073.867:4086): pid=3143 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/632/bus" dev="sda1" ino=16553 res=1 [ 609.083196][ T3146] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 609.120489][ T3155] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:17:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x600}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34002}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:17:54 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x38000000) [ 609.373762][ T3165] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 609.394147][ T3165] device lo left promiscuous mode [ 609.435116][ T3165] device tunl0 left promiscuous mode [ 609.448377][ T3165] device gre0 left promiscuous mode [ 609.476494][ T3165] device gretap0 left promiscuous mode [ 609.488791][ T3165] device erspan0 left promiscuous mode [ 609.498149][ T3165] device ip_vti0 left promiscuous mode [ 609.504008][ T3165] device ip6_vti0 left promiscuous mode [ 609.509696][ T27] audit: type=1804 audit(1577179074.367:4087): pid=3176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/633/bus" dev="sda1" ino=16586 res=1 [ 609.542302][ T3165] device sit0 left promiscuous mode [ 609.547932][ T3165] device ip6tnl0 left promiscuous mode [ 609.553950][ T3165] device ip6gre0 left promiscuous mode [ 609.562620][ T3165] device syz_tun left promiscuous mode [ 609.568384][ T3165] device ip6gretap0 left promiscuous mode [ 609.574619][ T3165] device bridge0 left promiscuous mode [ 609.584481][ T3165] device vcan0 left promiscuous mode [ 609.590141][ T3165] device bond0 left promiscuous mode [ 609.599477][ T3165] device team0 left promiscuous mode [ 609.605168][ T3165] device dummy0 left promiscuous mode [ 609.610958][ T3165] device nlmon0 left promiscuous mode [ 609.620181][ T3165] device caif0 left promiscuous mode [ 609.625831][ T3165] device batadv0 left promiscuous mode [ 609.631729][ T3165] device vxcan0 left promiscuous mode [ 609.640240][ T3165] device vxcan1 left promiscuous mode [ 609.645929][ T3165] device veth0 left promiscuous mode [ 609.651411][ T3165] device veth1 left promiscuous mode [ 609.657100][ T3165] device veth0_to_bridge left promiscuous mode [ 609.663648][ T3165] device veth1_to_bridge left promiscuous mode [ 609.670229][ T3165] device veth0_to_bond left promiscuous mode [ 609.676586][ T3165] device bond_slave_0 left promiscuous mode [ 609.682713][ T3165] device veth1_to_bond left promiscuous mode [ 609.689320][ T3165] device bond_slave_1 left promiscuous mode [ 609.695454][ T3165] device veth0_to_team left promiscuous mode [ 609.701747][ T3165] device team_slave_0 left promiscuous mode [ 609.707942][ T3165] device veth1_to_team left promiscuous mode [ 609.714168][ T3165] device team_slave_1 left promiscuous mode [ 609.720400][ T3165] device veth0_to_hsr left promiscuous mode [ 609.727040][ T3165] device veth1_to_hsr left promiscuous mode [ 609.733273][ T3165] device hsr0 left promiscuous mode [ 609.738691][ T3165] device netdevsim0 left promiscuous mode [ 609.744588][ T3165] device netdevsim1 left promiscuous mode [ 609.751949][ T3165] device netdevsim2 left promiscuous mode [ 609.764671][ T3165] device netdevsim3 left promiscuous mode [ 609.781072][ T3165] device wlan0 left promiscuous mode [ 609.787202][ T3165] device wlan1 left promiscuous mode [ 609.792838][ T3165] device vti0 left promiscuous mode [ 609.800857][ T3165] device vti1 left promiscuous mode [ 609.807417][ T3165] device vti2 left promiscuous mode 09:17:54 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x39000000) [ 609.829150][ T3165] device veth2 left promiscuous mode 09:17:54 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 609.864157][ T3165] device veth3 left promiscuous mode [ 609.878018][ T3170] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:17:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x86010000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 609.983607][ T27] audit: type=1804 audit(1577179074.847:4088): pid=3188 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/634/bus" dev="sda1" ino=16586 res=1 09:17:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x240, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:17:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x700}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 610.122604][ T3193] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:17:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 610.224516][ T3201] device lo entered promiscuous mode [ 610.251419][ T3201] device tunl0 entered promiscuous mode 09:17:55 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3a000000) 09:17:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34003}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 610.287341][ T3201] device gre0 entered promiscuous mode [ 610.313634][ T3201] device gretap0 entered promiscuous mode [ 610.328460][ T3201] device erspan0 entered promiscuous mode [ 610.354041][ T3201] device ip_vti0 entered promiscuous mode [ 610.397454][ T27] audit: type=1804 audit(1577179075.267:4089): pid=3216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/635/bus" dev="sda1" ino=16566 res=1 [ 610.398031][ T3201] device ip6_vti0 entered promiscuous mode [ 610.475152][ T3201] device sit0 entered promiscuous mode [ 610.480884][ T3201] device ip6tnl0 entered promiscuous mode [ 610.493575][ T3201] device ip6gre0 entered promiscuous mode [ 610.506360][ T3201] device syz_tun entered promiscuous mode [ 610.519765][ T3201] device ip6gretap0 entered promiscuous mode [ 610.532711][ T3201] device bridge0 entered promiscuous mode [ 610.545537][ T3201] device vcan0 entered promiscuous mode [ 610.554889][ T3201] device bond0 entered promiscuous mode [ 610.568111][ T3201] device bond_slave_0 entered promiscuous mode [ 610.581262][ T3201] device bond_slave_1 entered promiscuous mode [ 610.594417][ T3201] device team0 entered promiscuous mode [ 610.605799][ T3201] device team_slave_0 entered promiscuous mode [ 610.619880][ T3201] device team_slave_1 entered promiscuous mode 09:17:55 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3b000000) [ 610.631562][ T3201] device dummy0 entered promiscuous mode [ 610.646480][ T3201] device nlmon0 entered promiscuous mode [ 610.670030][ T3201] device caif0 entered promiscuous mode [ 610.685892][ T3201] device batadv0 entered promiscuous mode [ 610.708408][ T3201] device vxcan0 entered promiscuous mode [ 610.718238][ T3201] device vxcan1 entered promiscuous mode [ 610.719513][ T27] audit: type=1804 audit(1577179075.587:4090): pid=3224 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/636/bus" dev="sda1" ino=16566 res=1 [ 610.738821][ T3201] device veth0 entered promiscuous mode 09:17:55 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 610.785202][ T3201] device veth1 entered promiscuous mode [ 610.815605][ T3201] device veth0_to_bridge entered promiscuous mode [ 610.839558][ T3201] device veth1_to_bridge entered promiscuous mode [ 610.863417][ T3201] device veth0_to_bond entered promiscuous mode [ 610.873310][ T3201] device veth1_to_bond entered promiscuous mode [ 610.891201][ T3201] device veth0_to_team entered promiscuous mode [ 610.900570][ T3201] device veth1_to_team entered promiscuous mode [ 610.910223][ T3201] device veth0_to_hsr entered promiscuous mode [ 610.917005][ T3201] device veth1_to_hsr entered promiscuous mode [ 610.923576][ T3201] device hsr0 entered promiscuous mode [ 610.929283][ T3201] device netdevsim0 entered promiscuous mode [ 610.936765][ T3201] device netdevsim1 entered promiscuous mode [ 610.942966][ T3201] device netdevsim2 entered promiscuous mode [ 610.949247][ T3201] device netdevsim3 entered promiscuous mode [ 610.955496][ T3201] device wlan0 entered promiscuous mode [ 610.961218][ T3201] device wlan1 entered promiscuous mode [ 610.966963][ T3201] device vti0 entered promiscuous mode [ 610.972789][ T3201] device vti1 entered promiscuous mode [ 610.978593][ T3201] device vti2 entered promiscuous mode [ 610.984647][ T3201] device veth2 entered promiscuous mode 09:17:55 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3c000000) [ 610.990625][ T3201] device veth3 entered promiscuous mode [ 610.997542][ T3209] device lo entered promiscuous mode [ 611.012509][ T3209] device tunl0 entered promiscuous mode [ 611.044105][ T3209] device gre0 entered promiscuous mode [ 611.074069][ T3209] device gretap0 entered promiscuous mode 09:17:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 611.091295][ T27] audit: type=1804 audit(1577179075.957:4091): pid=3233 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/637/bus" dev="sda1" ino=16566 res=1 [ 611.103810][ T3209] device erspan0 entered promiscuous mode [ 611.156071][ T3209] device ip_vti0 entered promiscuous mode [ 611.165315][ T3209] device ip6_vti0 entered promiscuous mode [ 611.187498][ T3209] device sit0 entered promiscuous mode [ 611.204396][ T3209] device ip6tnl0 entered promiscuous mode [ 611.223685][ T3209] device ip6gre0 entered promiscuous mode [ 611.249012][ T3209] device syz_tun entered promiscuous mode [ 611.263374][ T3209] device ip6gretap0 entered promiscuous mode [ 611.286214][ T3209] device bridge0 entered promiscuous mode 09:17:56 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3f000000) [ 611.301317][ T3209] device vcan0 entered promiscuous mode [ 611.327750][ T3209] device bond0 entered promiscuous mode [ 611.334464][ T3209] device bond_slave_0 entered promiscuous mode 09:17:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34007}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 611.349270][ T3209] device bond_slave_1 entered promiscuous mode [ 611.366883][ T3209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 611.385058][ T3209] device team0 entered promiscuous mode [ 611.390759][ T3209] device team_slave_0 entered promiscuous mode [ 611.400667][ T3209] device team_slave_1 entered promiscuous mode [ 611.407940][ T3209] 8021q: adding VLAN 0 to HW filter on device team0 [ 611.438218][ T27] audit: type=1804 audit(1577179076.307:4092): pid=3249 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/638/bus" dev="sda1" ino=16566 res=1 [ 611.440064][ T3209] device dummy0 entered promiscuous mode [ 611.498387][ T3209] device nlmon0 entered promiscuous mode [ 611.534994][ T3209] device caif0 entered promiscuous mode [ 611.540768][ T3209] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 611.584767][ T3242] device lo left promiscuous mode [ 611.591469][ T3242] device tunl0 left promiscuous mode 09:17:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x300, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) [ 611.614648][ T3242] device gre0 left promiscuous mode 09:17:56 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x40000000) 09:17:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 611.648400][ T3242] device gretap0 left promiscuous mode [ 611.680209][ T3242] device erspan0 left promiscuous mode [ 611.712591][ T3242] device ip_vti0 left promiscuous mode [ 611.719600][ T3242] device ip6_vti0 left promiscuous mode 09:17:56 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 611.775172][ T3242] device sit0 left promiscuous mode [ 611.781186][ T3242] device ip6tnl0 left promiscuous mode [ 611.809685][ T3242] device ip6gre0 left promiscuous mode [ 611.845137][ T3242] device syz_tun left promiscuous mode [ 611.850693][ T27] audit: type=1804 audit(1577179076.717:4093): pid=3269 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/639/bus" dev="sda1" ino=16566 res=1 [ 611.892677][ T3242] device ip6gretap0 left promiscuous mode [ 611.900212][ T3242] device bridge0 left promiscuous mode [ 611.908472][ T3242] device vcan0 left promiscuous mode [ 611.913990][ T3242] device bond0 left promiscuous mode [ 611.919809][ T3242] device team0 left promiscuous mode [ 611.925530][ T3242] device dummy0 left promiscuous mode [ 611.931506][ T3242] device nlmon0 left promiscuous mode [ 611.937193][ T3242] device caif0 left promiscuous mode [ 611.942686][ T3242] device batadv0 left promiscuous mode [ 611.948661][ T3242] device vxcan0 left promiscuous mode [ 611.954374][ T3242] device vxcan1 left promiscuous mode [ 611.960448][ T3242] device veth0 left promiscuous mode [ 611.965979][ T3242] device veth1 left promiscuous mode [ 611.971578][ T3242] device veth0_to_bridge left promiscuous mode [ 611.978257][ T3242] device veth1_to_bridge left promiscuous mode [ 611.984680][ T3242] device veth0_to_bond left promiscuous mode [ 611.991022][ T3242] device bond_slave_0 left promiscuous mode [ 611.997323][ T3242] device veth1_to_bond left promiscuous mode [ 612.003772][ T3242] device bond_slave_1 left promiscuous mode [ 612.010378][ T3242] device veth0_to_team left promiscuous mode [ 612.026550][ T3242] device team_slave_0 left promiscuous mode [ 612.036823][ T3242] device veth1_to_team left promiscuous mode [ 612.047512][ T3242] device team_slave_1 left promiscuous mode [ 612.059498][ T3242] device veth0_to_hsr left promiscuous mode [ 612.069054][ T3242] device veth1_to_hsr left promiscuous mode [ 612.083367][ T3242] device hsr0 left promiscuous mode [ 612.091063][ T3242] device netdevsim0 left promiscuous mode [ 612.097096][ T3242] device netdevsim1 left promiscuous mode [ 612.103084][ T3242] device netdevsim2 left promiscuous mode [ 612.109010][ T3242] device netdevsim3 left promiscuous mode [ 612.115348][ T3242] device wlan0 left promiscuous mode [ 612.120970][ T3242] device wlan1 left promiscuous mode [ 612.126685][ T3242] device vti0 left promiscuous mode [ 612.132129][ T3242] device vti1 left promiscuous mode [ 612.137596][ T3242] device vti2 left promiscuous mode [ 612.142962][ T3242] device veth2 left promiscuous mode 09:17:57 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x48000000) [ 612.148667][ T3242] device veth3 left promiscuous mode 09:17:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 612.194985][ T3270] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:17:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa4e99105}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 612.350252][ T27] audit: type=1804 audit(1577179077.217:4094): pid=3413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/640/bus" dev="sda1" ino=16588 res=1 09:17:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x20034040}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:17:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:57 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x4c000000) [ 612.605432][ T3417] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:17:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0xc02, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:17:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc3ffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:57 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 612.935297][ T3444] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:17:57 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x68000000) 09:17:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0ffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3bb4}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 613.168215][ T3459] validate_nla: 9 callbacks suppressed [ 613.168229][ T3459] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 613.235011][ T3459] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 613.256973][ T3461] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 613.275919][ T3461] device lo entered promiscuous mode 09:17:58 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x6c000000) [ 613.299170][ T3461] device tunl0 entered promiscuous mode [ 613.322714][ T3461] device gre0 entered promiscuous mode 09:17:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfeffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 613.352287][ T3461] device gretap0 entered promiscuous mode [ 613.373830][ T3461] device erspan0 entered promiscuous mode [ 613.398458][ T3461] device ip_vti0 entered promiscuous mode [ 613.404439][ T3461] device ip6_vti0 entered promiscuous mode [ 613.435050][ T3461] device sit0 entered promiscuous mode [ 613.440762][ T3461] device ip6tnl0 entered promiscuous mode 09:17:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x7ffff000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 613.482738][ T3461] device ip6gre0 entered promiscuous mode [ 613.500934][ T3461] device syz_tun entered promiscuous mode [ 613.506825][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 613.506899][ T27] audit: type=1804 audit(1577179078.367:4097): pid=3471 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/643/bus" dev="sda1" ino=16584 res=1 [ 613.549389][ T3461] device ip6gretap0 entered promiscuous mode [ 613.562392][ T3461] device bridge0 entered promiscuous mode [ 613.583027][ T3461] device vcan0 entered promiscuous mode [ 613.589168][ T3461] device bond0 entered promiscuous mode [ 613.595196][ T3461] device bond_slave_0 entered promiscuous mode [ 613.601625][ T3461] device bond_slave_1 entered promiscuous mode [ 613.608828][ T3461] device team0 entered promiscuous mode [ 613.614673][ T3461] device team_slave_0 entered promiscuous mode [ 613.621120][ T3461] device team_slave_1 entered promiscuous mode [ 613.635246][ T3461] device dummy0 entered promiscuous mode [ 613.646708][ T3461] device nlmon0 entered promiscuous mode [ 613.652894][ T3461] device caif0 entered promiscuous mode [ 613.659255][ T3461] device batadv0 entered promiscuous mode [ 613.665530][ T3461] device vxcan0 entered promiscuous mode [ 613.671548][ T3461] device vxcan1 entered promiscuous mode [ 613.677857][ T3461] device veth0 entered promiscuous mode [ 613.683695][ T3461] device veth1 entered promiscuous mode [ 613.690663][ T3461] device veth0_to_bridge entered promiscuous mode [ 613.697505][ T3461] device veth1_to_bridge entered promiscuous mode [ 613.704529][ T3461] device veth0_to_bond entered promiscuous mode [ 613.711363][ T3461] device veth1_to_bond entered promiscuous mode [ 613.718539][ T3461] device veth0_to_team entered promiscuous mode [ 613.725292][ T3461] device veth1_to_team entered promiscuous mode 09:17:58 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x74000000) 09:17:58 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 613.731765][ T3461] device veth0_to_hsr entered promiscuous mode [ 613.738772][ T3461] device veth1_to_hsr entered promiscuous mode [ 613.746706][ T3461] device hsr0 entered promiscuous mode [ 613.758084][ T3461] device netdevsim0 entered promiscuous mode [ 613.785735][ T3461] device netdevsim1 entered promiscuous mode [ 613.788476][ T27] audit: type=1804 audit(1577179078.657:4098): pid=3481 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/644/bus" dev="sda1" ino=16584 res=1 [ 613.791882][ T3461] device netdevsim2 entered promiscuous mode [ 613.844819][ T3461] device netdevsim3 entered promiscuous mode [ 613.851349][ T3461] device wlan0 entered promiscuous mode [ 613.857641][ T3461] device wlan1 entered promiscuous mode [ 613.863298][ T3461] device vti0 entered promiscuous mode [ 613.869151][ T3461] device vti1 entered promiscuous mode [ 613.874762][ T3461] device vti2 entered promiscuous mode [ 613.880664][ T3461] device veth2 entered promiscuous mode [ 613.895089][ T3461] device veth3 entered promiscuous mode [ 613.900896][ T3470] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 613.968145][ T3470] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:17:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x3f00, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:17:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:17:58 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x7a000000) 09:17:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffa888}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 614.081431][ T3491] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 614.115298][ T3491] device lo left promiscuous mode [ 614.150604][ T3491] device tunl0 left promiscuous mode [ 614.163023][ T27] audit: type=1804 audit(1577179079.027:4099): pid=3498 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/645/bus" dev="sda1" ino=16598 res=1 [ 614.184842][ T3491] device gre0 left promiscuous mode [ 614.201863][ T3491] device gretap0 left promiscuous mode [ 614.218178][ T3491] device erspan0 left promiscuous mode [ 614.223773][ T3491] device ip_vti0 left promiscuous mode [ 614.245027][ T3491] device ip6_vti0 left promiscuous mode [ 614.252732][ T3491] device sit0 left promiscuous mode [ 614.268685][ T3491] device ip6tnl0 left promiscuous mode [ 614.282644][ T3491] device ip6gre0 left promiscuous mode [ 614.289429][ T3491] device syz_tun left promiscuous mode [ 614.298068][ T3491] device ip6gretap0 left promiscuous mode [ 614.304356][ T3491] device bridge0 left promiscuous mode [ 614.311554][ T3491] device vcan0 left promiscuous mode [ 614.319504][ T3491] device bond0 left promiscuous mode [ 614.326543][ T3491] device team0 left promiscuous mode [ 614.332827][ T3491] device dummy0 left promiscuous mode [ 614.340998][ T3491] device nlmon0 left promiscuous mode [ 614.347744][ T3491] device caif0 left promiscuous mode 09:17:59 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xf4ffffff) [ 614.353357][ T3491] device batadv0 left promiscuous mode [ 614.362328][ T3491] device vxcan0 left promiscuous mode [ 614.368881][ T3491] device vxcan1 left promiscuous mode [ 614.385995][ T3491] device veth0 left promiscuous mode [ 614.395684][ T3491] device veth1 left promiscuous mode 09:17:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 614.425102][ T3491] device veth0_to_bridge left promiscuous mode [ 614.439267][ T3491] device veth1_to_bridge left promiscuous mode [ 614.450613][ T3491] device veth0_to_bond left promiscuous mode [ 614.457205][ T3491] device bond_slave_0 left promiscuous mode [ 614.463295][ T3491] device veth1_to_bond left promiscuous mode [ 614.469732][ T3491] device bond_slave_1 left promiscuous mode [ 614.476068][ T3491] device veth0_to_team left promiscuous mode [ 614.482189][ T3491] device team_slave_0 left promiscuous mode [ 614.488917][ T3491] device veth1_to_team left promiscuous mode [ 614.507299][ T3491] device team_slave_1 left promiscuous mode [ 614.533842][ T3491] device veth0_to_hsr left promiscuous mode [ 614.537969][ T27] audit: type=1804 audit(1577179079.397:4100): pid=3508 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/646/bus" dev="sda1" ino=16554 res=1 [ 614.542524][ T3491] device veth1_to_hsr left promiscuous mode [ 614.572771][ T3491] device hsr0 left promiscuous mode [ 614.578473][ T3491] device netdevsim0 left promiscuous mode [ 614.584414][ T3491] device netdevsim1 left promiscuous mode [ 614.624364][ T3491] device netdevsim2 left promiscuous mode 09:17:59 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 614.652282][ T3491] device netdevsim3 left promiscuous mode [ 614.680117][ T3491] device wlan0 left promiscuous mode [ 614.705570][ T3491] device wlan1 left promiscuous mode [ 614.726254][ T3491] device vti0 left promiscuous mode [ 614.746771][ T3491] device vti1 left promiscuous mode [ 614.752386][ T3491] device vti2 left promiscuous mode [ 614.761121][ T3491] device veth2 left promiscuous mode [ 614.767224][ T3491] device veth3 left promiscuous mode [ 614.773141][ T3497] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:17:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4800}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 614.815226][ T3497] device lo left promiscuous mode 09:17:59 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xf6ffffff) [ 614.936715][ T27] audit: type=1804 audit(1577179079.807:4101): pid=3524 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/647/bus" dev="sda1" ino=16554 res=1 [ 614.970573][ T3497] device tunl0 left promiscuous mode [ 615.034423][ T3497] device gre0 left promiscuous mode 09:17:59 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xfeffffff) [ 615.074849][ T3497] device gretap0 left promiscuous mode [ 615.137964][ T27] audit: type=1804 audit(1577179080.007:4102): pid=3531 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/648/bus" dev="sda1" ino=16554 res=1 [ 615.188246][ T3497] device erspan0 left promiscuous mode 09:18:00 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xff000000) [ 615.236469][ T3497] device ip_vti0 left promiscuous mode [ 615.276709][ T3497] device ip6_vti0 left promiscuous mode [ 615.309770][ T27] audit: type=1804 audit(1577179080.177:4103): pid=3535 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/649/bus" dev="sda1" ino=16554 res=1 [ 615.363460][ T3497] device sit0 left promiscuous mode 09:18:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x2, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 615.400835][ T3497] device ip6tnl0 left promiscuous mode [ 615.514599][ T3497] device ip6gre0 left promiscuous mode [ 615.577877][ T3497] device syz_tun left promiscuous mode [ 615.629750][ T3497] device ip6gretap0 left promiscuous mode [ 615.668401][ T3497] device bridge0 left promiscuous mode [ 615.701702][ T3497] device vcan0 left promiscuous mode [ 615.738165][ T3497] device bond0 left promiscuous mode [ 615.743518][ T3497] device bond_slave_0 left promiscuous mode [ 615.749777][ T3497] device bond_slave_1 left promiscuous mode [ 615.790349][ T3497] device team0 left promiscuous mode [ 615.796841][ T3497] device team_slave_0 left promiscuous mode [ 615.803106][ T3497] device team_slave_1 left promiscuous mode [ 615.852946][ T3497] device dummy0 left promiscuous mode [ 615.899722][ T3497] device nlmon0 left promiscuous mode [ 615.944705][ T3497] device caif0 left promiscuous mode [ 615.985290][ T3521] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x4000, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:18:00 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xff0f0000) 09:18:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff7f}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:00 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 616.132092][ T3649] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 616.145608][ T3649] device lo entered promiscuous mode [ 616.153080][ T27] audit: type=1804 audit(1577179081.017:4104): pid=3650 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/650/bus" dev="sda1" ino=16557 res=1 09:18:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4c00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 616.174276][ T3649] device tunl0 entered promiscuous mode [ 616.213626][ T3649] device gre0 entered promiscuous mode [ 616.256162][ T3649] device gretap0 entered promiscuous mode [ 616.273275][ T3649] device erspan0 entered promiscuous mode [ 616.293539][ T3649] device ip_vti0 entered promiscuous mode [ 616.312187][ T3649] device ip6_vti0 entered promiscuous mode 09:18:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x3, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 616.370347][ T3649] device sit0 entered promiscuous mode [ 616.383280][ T3649] device ip6tnl0 entered promiscuous mode [ 616.390630][ T3649] device ip6gre0 entered promiscuous mode [ 616.397708][ T3649] device syz_tun entered promiscuous mode [ 616.404249][ T3649] device ip6gretap0 entered promiscuous mode [ 616.411488][ T3649] device bridge0 entered promiscuous mode 09:18:01 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xffffff7f) [ 616.419641][ T3649] device vcan0 entered promiscuous mode [ 616.426655][ T3649] device bond0 entered promiscuous mode [ 616.432635][ T3649] device bond_slave_0 entered promiscuous mode [ 616.491882][ T3649] device bond_slave_1 entered promiscuous mode [ 616.499289][ T3649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 616.538941][ T3649] device team0 entered promiscuous mode [ 616.554840][ T27] audit: type=1804 audit(1577179081.417:4105): pid=3673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/651/bus" dev="sda1" ino=16598 res=1 [ 616.590965][ T3649] device team_slave_0 entered promiscuous mode [ 616.617390][ T3649] device team_slave_1 entered promiscuous mode [ 616.640487][ T3649] 8021q: adding VLAN 0 to HW filter on device team0 [ 616.657095][ T3649] device dummy0 entered promiscuous mode [ 616.675821][ T3649] device nlmon0 entered promiscuous mode 09:18:01 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xfffffff4) [ 616.735017][ T3649] device caif0 entered promiscuous mode [ 616.743233][ T3649] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 616.801611][ T27] audit: type=1804 audit(1577179081.667:4106): pid=3679 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/652/bus" dev="sda1" ino=16598 res=1 09:18:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff9e}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 616.870875][ T3665] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5865}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 617.028962][ T3684] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:01 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x4002, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:18:02 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xfffffff6) 09:18:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x8, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:02 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xfffffffe) 09:18:02 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xffffffff000) [ 618.142445][ T3684] device batadv0 entered promiscuous mode [ 618.151804][ T3684] device vxcan0 entered promiscuous mode [ 618.158093][ T3684] device vxcan1 entered promiscuous mode [ 618.164088][ T3684] device veth0 entered promiscuous mode [ 618.173644][ T3684] device veth1 entered promiscuous mode [ 618.180182][ T3684] device veth0_to_bridge entered promiscuous mode 09:18:03 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1000000000000) [ 618.190299][ T3684] device veth1_to_bridge entered promiscuous mode [ 618.197436][ T3684] device veth0_to_bond entered promiscuous mode [ 618.204007][ T3684] device veth1_to_bond entered promiscuous mode [ 618.214224][ T3684] device veth0_to_team entered promiscuous mode [ 618.221292][ T3684] device veth1_to_team entered promiscuous mode [ 618.231600][ T3684] device veth0_to_hsr entered promiscuous mode [ 618.238625][ T3684] device veth1_to_hsr entered promiscuous mode [ 618.248495][ T3684] device hsr0 entered promiscuous mode [ 618.254226][ T3684] device veth2 entered promiscuous mode [ 618.260470][ T3684] device veth3 entered promiscuous mode [ 618.276325][ T3684] device veth4 entered promiscuous mode 09:18:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0xa, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 618.292298][ T3684] device veth5 entered promiscuous mode [ 618.298598][ T3684] device veth6 entered promiscuous mode [ 618.304403][ T3684] device veth7 entered promiscuous mode [ 618.314310][ T3684] device veth8 entered promiscuous mode [ 618.321046][ T3684] device veth9 entered promiscuous mode [ 618.335131][ T3685] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffc3}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:03 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x82200000000000) [ 618.396514][ T3685] 8021q: adding VLAN 0 to HW filter on device bond0 [ 618.423219][ T3685] 8021q: adding VLAN 0 to HW filter on device team0 [ 618.504981][ T3685] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:18:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 618.578483][ T3844] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:03 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x34000, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) [ 618.676824][ T3844] 8021q: adding VLAN 0 to HW filter on device bond0 [ 618.714888][ T3844] 8021q: adding VLAN 0 to HW filter on device team0 09:18:03 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xf0ffffff0f0000) [ 618.785180][ T3844] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 618.797731][ T27] kauditd_printk_skb: 5 callbacks suppressed [ 618.797754][ T27] audit: type=1804 audit(1577179083.657:4112): pid=3857 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/658/bus" dev="sda1" ino=16557 res=1 [ 618.814250][ T3847] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffff0}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:03 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x100000000000000) [ 619.142997][ T27] audit: type=1804 audit(1577179084.007:4113): pid=3869 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/659/bus" dev="sda1" ino=16607 res=1 09:18:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x11, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:04 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x200000000000000) [ 619.598721][ T27] audit: type=1804 audit(1577179084.467:4114): pid=3982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/660/bus" dev="sda1" ino=16607 res=1 09:18:04 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x300000000000000) [ 619.768183][ T27] audit: type=1804 audit(1577179084.637:4115): pid=3987 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/661/bus" dev="sda1" ino=16607 res=1 09:18:04 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x400000000000000) [ 619.949512][ T27] audit: type=1804 audit(1577179084.817:4116): pid=3994 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/662/bus" dev="sda1" ino=16607 res=1 09:18:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6558}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 620.042804][ T3866] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:05 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:05 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x500000000000000) [ 620.222058][ T27] audit: type=1804 audit(1577179085.087:4117): pid=4004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/663/bus" dev="sda1" ino=16607 res=1 09:18:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x500, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x400300, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:18:05 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x600000000000000) 09:18:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 620.745002][ T3997] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 620.753373][ T3997] device lo entered promiscuous mode [ 620.770859][ T3997] device tunl0 entered promiscuous mode [ 620.780473][ T3997] device gre0 entered promiscuous mode [ 620.786656][ T3997] device gretap0 entered promiscuous mode [ 620.792686][ T3997] device erspan0 entered promiscuous mode [ 620.798771][ T3997] device ip_vti0 entered promiscuous mode [ 620.804969][ T3997] device ip6_vti0 entered promiscuous mode [ 620.810864][ T3997] device sit0 entered promiscuous mode [ 620.824531][ T27] audit: type=1804 audit(1577179085.687:4118): pid=4017 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/664/bus" dev="sda1" ino=16486 res=1 [ 620.859174][ T3997] device ip6tnl0 entered promiscuous mode [ 620.875053][ T3997] device ip6gre0 entered promiscuous mode [ 620.905061][ T3997] device syz_tun entered promiscuous mode [ 620.913447][ T3997] device ip6gretap0 entered promiscuous mode [ 620.919732][ T3997] device bridge0 entered promiscuous mode [ 620.925937][ T3997] device vcan0 entered promiscuous mode [ 620.932225][ T3997] device bond0 entered promiscuous mode [ 620.938099][ T3997] device bond_slave_0 entered promiscuous mode [ 620.944447][ T3997] device bond_slave_1 entered promiscuous mode [ 620.951037][ T3997] device team0 entered promiscuous mode [ 620.956932][ T3997] device team_slave_0 entered promiscuous mode [ 620.963582][ T3997] device team_slave_1 entered promiscuous mode [ 620.970236][ T3997] device dummy0 entered promiscuous mode [ 620.976498][ T3997] device nlmon0 entered promiscuous mode [ 620.982573][ T3997] device caif0 entered promiscuous mode [ 620.988464][ T3997] device batadv0 entered promiscuous mode [ 620.994874][ T3997] device vxcan0 entered promiscuous mode [ 621.001070][ T3997] device vxcan1 entered promiscuous mode [ 621.007000][ T3997] device veth0 entered promiscuous mode [ 621.012743][ T3997] device veth1 entered promiscuous mode [ 621.024475][ T3997] device veth0_to_bridge entered promiscuous mode [ 621.034341][ T3997] device veth1_to_bridge entered promiscuous mode [ 621.046421][ T3997] device veth0_to_bond entered promiscuous mode [ 621.060069][ T3997] device veth1_to_bond entered promiscuous mode [ 621.074583][ T3997] device veth0_to_team entered promiscuous mode [ 621.089592][ T3997] device veth1_to_team entered promiscuous mode 09:18:05 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x700000000000000) [ 621.105398][ T3997] device veth0_to_hsr entered promiscuous mode [ 621.120718][ T3997] device veth1_to_hsr entered promiscuous mode [ 621.155149][ T3997] device hsr0 entered promiscuous mode [ 621.169783][ T3997] device netdevsim0 entered promiscuous mode [ 621.191693][ T3997] device netdevsim1 entered promiscuous mode 09:18:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1a000, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 621.218175][ T3997] device netdevsim2 entered promiscuous mode [ 621.221113][ T27] audit: type=1804 audit(1577179086.087:4119): pid=4131 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/665/bus" dev="sda1" ino=16608 res=1 [ 621.241790][ T3997] device netdevsim3 entered promiscuous mode [ 621.255101][ T3997] device wlan0 entered promiscuous mode [ 621.261046][ T3997] device wlan1 entered promiscuous mode [ 621.267643][ T3997] device vti0 entered promiscuous mode [ 621.273910][ T3997] device vti1 entered promiscuous mode [ 621.279882][ T3997] device vti2 entered promiscuous mode [ 621.285867][ T3997] device veth2 entered promiscuous mode [ 621.293800][ T3997] device veth3 entered promiscuous mode [ 621.323087][ T4023] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6800}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:06 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 621.525685][ T4139] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:06 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x800000000000000) [ 621.573248][ T4139] device lo left promiscuous mode [ 621.586280][ T4139] device tunl0 left promiscuous mode [ 621.593766][ T4139] device gre0 left promiscuous mode [ 621.608319][ T4139] device gretap0 left promiscuous mode [ 621.618776][ T4139] device erspan0 left promiscuous mode [ 621.649115][ T4139] device ip_vti0 left promiscuous mode [ 621.655453][ T27] audit: type=1804 audit(1577179086.527:4120): pid=4148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/666/bus" dev="sda1" ino=16608 res=1 [ 621.667910][ T4139] device ip6_vti0 left promiscuous mode [ 621.695766][ T4139] device sit0 left promiscuous mode [ 621.701294][ T4139] device ip6tnl0 left promiscuous mode [ 621.711079][ T4139] device ip6gre0 left promiscuous mode [ 621.717125][ T4139] device syz_tun left promiscuous mode [ 621.722802][ T4139] device ip6gretap0 left promiscuous mode [ 621.732285][ T4139] device bridge0 left promiscuous mode [ 621.738103][ T4139] device vcan0 left promiscuous mode [ 621.744583][ T4139] device bond0 left promiscuous mode [ 621.753569][ T4139] device team0 left promiscuous mode [ 621.759266][ T4139] device dummy0 left promiscuous mode [ 621.768192][ T4139] device nlmon0 left promiscuous mode [ 621.773779][ T4139] device caif0 left promiscuous mode [ 621.779398][ T4139] device batadv0 left promiscuous mode [ 621.788471][ T4139] device vxcan0 left promiscuous mode 09:18:06 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x802000000000000) [ 621.797630][ T4139] device vxcan1 left promiscuous mode [ 621.803211][ T4139] device veth0 left promiscuous mode [ 621.812122][ T4139] device veth1 left promiscuous mode [ 621.817952][ T4139] device veth0_to_bridge left promiscuous mode [ 621.829014][ T4139] device veth1_to_bridge left promiscuous mode [ 621.837447][ T4139] device veth0_to_bond left promiscuous mode [ 621.843778][ T4139] device bond_slave_0 left promiscuous mode [ 621.853355][ T4139] device veth1_to_bond left promiscuous mode [ 621.859702][ T4139] device bond_slave_1 left promiscuous mode [ 621.869062][ T4139] device veth0_to_team left promiscuous mode [ 621.875448][ T4139] device team_slave_0 left promiscuous mode [ 621.878839][ T27] audit: type=1804 audit(1577179086.747:4121): pid=4158 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/667/bus" dev="sda1" ino=16608 res=1 [ 621.881623][ T4139] device veth1_to_team left promiscuous mode [ 621.921154][ T4139] device team_slave_1 left promiscuous mode [ 621.928559][ T4139] device veth0_to_hsr left promiscuous mode [ 621.934855][ T4139] device veth1_to_hsr left promiscuous mode [ 621.944041][ T4139] device hsr0 left promiscuous mode [ 621.950090][ T4139] device netdevsim0 left promiscuous mode [ 621.958498][ T4139] device netdevsim1 left promiscuous mode [ 621.964500][ T4139] device netdevsim2 left promiscuous mode [ 621.970971][ T4139] device netdevsim3 left promiscuous mode [ 621.979730][ T4139] device wlan0 left promiscuous mode [ 621.985757][ T4139] device wlan1 left promiscuous mode [ 621.991240][ T4139] device vti0 left promiscuous mode 09:18:06 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x900000000000000) 09:18:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6c00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 621.999347][ T4139] device vti1 left promiscuous mode [ 622.004800][ T4139] device vti2 left promiscuous mode [ 622.010927][ T4139] device veth2 left promiscuous mode [ 622.019202][ T4139] device veth3 left promiscuous mode [ 622.024766][ T4143] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x1000000, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:18:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 622.151383][ T4162] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7400}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x2, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 622.259187][ T4173] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:07 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7a00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:07 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xa00000000000000) 09:18:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8100}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 622.922132][ T4206] device lo entered promiscuous mode [ 622.931423][ T4206] device tunl0 entered promiscuous mode [ 622.942220][ T4206] device gre0 entered promiscuous mode [ 622.948378][ T4206] device gretap0 entered promiscuous mode [ 622.954344][ T4206] device erspan0 entered promiscuous mode [ 622.960882][ T4206] device ip_vti0 entered promiscuous mode [ 622.967007][ T4206] device ip6_vti0 entered promiscuous mode [ 622.973155][ T4206] device sit0 entered promiscuous mode [ 622.979259][ T4206] device ip6tnl0 entered promiscuous mode [ 622.985341][ T4206] device ip6gre0 entered promiscuous mode [ 622.991351][ T4206] device syz_tun entered promiscuous mode [ 623.000473][ T4206] device ip6gretap0 entered promiscuous mode [ 623.006987][ T4206] device bridge0 entered promiscuous mode [ 623.013011][ T4206] device vcan0 entered promiscuous mode [ 623.019296][ T4206] device bond0 entered promiscuous mode [ 623.025618][ T4206] device bond_slave_0 entered promiscuous mode [ 623.032200][ T4206] device bond_slave_1 entered promiscuous mode [ 623.039121][ T4206] device team0 entered promiscuous mode [ 623.044867][ T4206] device team_slave_0 entered promiscuous mode [ 623.052355][ T4206] device team_slave_1 entered promiscuous mode [ 623.059138][ T4206] device dummy0 entered promiscuous mode [ 623.068325][ T4206] device nlmon0 entered promiscuous mode [ 623.074245][ T4206] device caif0 entered promiscuous mode [ 623.082179][ T4206] device batadv0 entered promiscuous mode [ 623.091566][ T4206] device vxcan0 entered promiscuous mode [ 623.099167][ T4206] device vxcan1 entered promiscuous mode [ 623.109037][ T4206] device veth0 entered promiscuous mode [ 623.114994][ T4206] device veth1 entered promiscuous mode [ 623.121099][ T4206] device veth0_to_bridge entered promiscuous mode [ 623.130339][ T4206] device veth1_to_bridge entered promiscuous mode [ 623.136974][ T4206] device veth0_to_bond entered promiscuous mode [ 623.143412][ T4206] device veth1_to_bond entered promiscuous mode [ 623.153277][ T4206] device veth0_to_team entered promiscuous mode [ 623.159751][ T4206] device veth1_to_team entered promiscuous mode [ 623.168922][ T4206] device veth0_to_hsr entered promiscuous mode [ 623.175804][ T4206] device veth1_to_hsr entered promiscuous mode [ 623.182142][ T4206] device hsr0 entered promiscuous mode [ 623.190577][ T4206] device netdevsim0 entered promiscuous mode [ 623.196710][ T4206] device netdevsim1 entered promiscuous mode [ 623.202922][ T4206] device netdevsim2 entered promiscuous mode [ 623.212531][ T4206] device netdevsim3 entered promiscuous mode 09:18:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x2000000, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:18:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:08 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xb00000000000000) 09:18:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x3, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 623.218661][ T4206] device wlan0 entered promiscuous mode [ 623.224286][ T4206] device wlan1 entered promiscuous mode [ 623.232698][ T4206] device vti0 entered promiscuous mode [ 623.238308][ T4206] device vti1 entered promiscuous mode [ 623.243876][ T4206] device vti2 entered promiscuous mode [ 623.252528][ T4206] device veth2 entered promiscuous mode [ 623.258339][ T4206] device veth3 entered promiscuous mode 09:18:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb43b}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:08 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 623.442596][ T4228] validate_nla: 8 callbacks suppressed [ 623.442608][ T4228] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 623.505341][ T4228] device lo left promiscuous mode [ 623.519850][ T4228] device tunl0 left promiscuous mode [ 623.538646][ T4228] device gre0 left promiscuous mode [ 623.552901][ T4228] device gretap0 left promiscuous mode [ 623.566557][ T4228] device erspan0 left promiscuous mode [ 623.579655][ T4228] device ip_vti0 left promiscuous mode [ 623.595099][ T4228] device ip6_vti0 left promiscuous mode [ 623.607464][ T4228] device sit0 left promiscuous mode [ 623.622203][ T4228] device ip6tnl0 left promiscuous mode [ 623.636709][ T4228] device ip6gre0 left promiscuous mode [ 623.651136][ T4228] device syz_tun left promiscuous mode 09:18:08 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xc00000000000000) [ 623.665542][ T4228] device ip6gretap0 left promiscuous mode [ 623.679028][ T4228] device bridge0 left promiscuous mode [ 623.707293][ T4228] device vcan0 left promiscuous mode [ 623.728629][ T4228] device bond0 left promiscuous mode [ 623.775264][ T4228] 8021q: adding VLAN 0 to HW filter on device bond0 [ 623.783217][ T4228] device team0 left promiscuous mode [ 623.809289][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 623.809443][ T27] audit: type=1804 audit(1577179088.677:4125): pid=4242 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/671/bus" dev="sda1" ino=16616 res=1 [ 623.815541][ T4228] 8021q: adding VLAN 0 to HW filter on device team0 [ 623.817250][ T4228] device dummy0 left promiscuous mode [ 623.865742][ T4228] device nlmon0 left promiscuous mode [ 623.915080][ T4228] device caif0 left promiscuous mode [ 623.920530][ T4228] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 623.954989][ T4232] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:08 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xd00000000000000) 09:18:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 624.112598][ T4248] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 624.133861][ T27] audit: type=1804 audit(1577179088.997:4126): pid=4249 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/672/bus" dev="sda1" ino=16523 res=1 [ 624.217074][ T4255] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x3000000, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:18:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x4, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:09 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:09 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xe00000000000000) [ 624.648596][ T27] audit: type=1804 audit(1577179089.517:4127): pid=4278 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/673/bus" dev="sda1" ino=16610 res=1 09:18:09 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xf00000000000000) [ 624.866180][ T27] audit: type=1804 audit(1577179089.737:4128): pid=4284 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/674/bus" dev="sda1" ino=16610 res=1 09:18:09 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1000000000000000) [ 625.203982][ T27] audit: type=1804 audit(1577179090.067:4129): pid=4389 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/675/bus" dev="sda1" ino=16630 res=1 09:18:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x7, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:10 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1100000000000000) [ 625.481753][ T4255] device batadv0 left promiscuous mode [ 625.491220][ T4255] device vxcan0 left promiscuous mode [ 625.496957][ T4255] device vxcan1 left promiscuous mode [ 625.503251][ T4255] device veth0 left promiscuous mode [ 625.506334][ T27] audit: type=1804 audit(1577179090.367:4130): pid=4402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/676/bus" dev="sda1" ino=16630 res=1 [ 625.511656][ T4255] device veth1 left promiscuous mode [ 625.541186][ T4255] device veth0_to_bridge left promiscuous mode [ 625.547613][ T4255] device veth1_to_bridge left promiscuous mode [ 625.554055][ T4255] device veth0_to_bond left promiscuous mode [ 625.563540][ T4255] device bond_slave_0 left promiscuous mode [ 625.569710][ T4255] device veth1_to_bond left promiscuous mode [ 625.579311][ T4255] device bond_slave_1 left promiscuous mode [ 625.585386][ T4255] device veth0_to_team left promiscuous mode [ 625.591538][ T4255] device team_slave_0 left promiscuous mode [ 625.601209][ T4255] device veth1_to_team left promiscuous mode [ 625.607786][ T4255] device team_slave_1 left promiscuous mode [ 625.613888][ T4255] device veth0_to_hsr left promiscuous mode [ 625.623403][ T4255] device veth1_to_hsr left promiscuous mode 09:18:10 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1200000000000000) [ 625.629690][ T4255] device hsr0 left promiscuous mode [ 625.637972][ T4255] device netdevsim0 left promiscuous mode [ 625.643910][ T4255] device netdevsim1 left promiscuous mode [ 625.649896][ T4255] device netdevsim2 left promiscuous mode [ 625.658915][ T4255] device netdevsim3 left promiscuous mode [ 625.666114][ T4255] device wlan0 left promiscuous mode [ 625.671567][ T4255] device wlan1 left promiscuous mode [ 625.679909][ T4255] device vti0 left promiscuous mode [ 625.685259][ T4255] device vti1 left promiscuous mode [ 625.690628][ T4255] device vti2 left promiscuous mode [ 625.696009][ T4255] device veth2 left promiscuous mode [ 625.701455][ T4255] device veth3 left promiscuous mode [ 625.707375][ T4261] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:10 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 625.756702][ T27] audit: type=1804 audit(1577179090.627:4131): pid=4406 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/677/bus" dev="sda1" ino=16630 res=1 09:18:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0xc020000, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:18:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 625.940623][ T4414] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 625.960301][ T4415] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 626.069146][ T4422] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:11 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1300000000000000) [ 626.188158][ T4426] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x20c, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 626.270431][ T4431] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 626.415137][ T27] audit: type=1804 audit(1577179091.287:4132): pid=4436 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/678/bus" dev="sda1" ino=16630 res=1 09:18:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:11 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x3f000000, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:18:11 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1400000000000000) 09:18:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 626.979869][ T27] audit: type=1804 audit(1577179091.847:4133): pid=4466 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/679/bus" dev="sda1" ino=16626 res=1 09:18:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x240, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:12 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1500000000000000) 09:18:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 627.369683][ T27] audit: type=1804 audit(1577179092.237:4134): pid=4488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/680/bus" dev="sda1" ino=16627 res=1 09:18:12 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x186}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:12 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1600000000000000) 09:18:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x40000000, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:18:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 627.956870][ T4513] device lo left promiscuous mode 09:18:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 627.983891][ T4513] device tunl0 left promiscuous mode [ 627.999498][ T4513] device gre0 left promiscuous mode [ 628.027299][ T4513] device gretap0 left promiscuous mode [ 628.042319][ T4513] device erspan0 left promiscuous mode [ 628.051326][ T4513] device ip_vti0 left promiscuous mode [ 628.065177][ T4513] device ip6_vti0 left promiscuous mode [ 628.082892][ T4513] device sit0 left promiscuous mode [ 628.091741][ T4513] device ip6tnl0 left promiscuous mode [ 628.097482][ T4513] device ip6gre0 left promiscuous mode [ 628.103199][ T4513] device syz_tun left promiscuous mode [ 628.109188][ T4513] device ip6gretap0 left promiscuous mode [ 628.115208][ T4513] device bridge0 left promiscuous mode [ 628.124552][ T4513] device vcan0 left promiscuous mode [ 628.130216][ T4513] device bond0 left promiscuous mode [ 628.136032][ T4513] device team0 left promiscuous mode [ 628.141870][ T4513] device dummy0 left promiscuous mode [ 628.148219][ T4513] device nlmon0 left promiscuous mode [ 628.153803][ T4513] device caif0 left promiscuous mode [ 628.159442][ T4513] device batadv0 left promiscuous mode [ 628.165321][ T4513] device vxcan0 left promiscuous mode [ 628.170929][ T4513] device vxcan1 left promiscuous mode [ 628.176590][ T4513] device veth0 left promiscuous mode [ 628.182162][ T4513] device veth1 left promiscuous mode [ 628.188079][ T4513] device veth0_to_bridge left promiscuous mode [ 628.194568][ T4513] device veth1_to_bridge left promiscuous mode [ 628.201171][ T4513] device veth0_to_bond left promiscuous mode [ 628.207416][ T4513] device bond_slave_0 left promiscuous mode [ 628.213651][ T4513] device veth1_to_bond left promiscuous mode [ 628.225121][ T4513] device bond_slave_1 left promiscuous mode [ 628.233346][ T4513] device veth0_to_team left promiscuous mode [ 628.239807][ T4513] device team_slave_0 left promiscuous mode [ 628.246093][ T4513] device veth1_to_team left promiscuous mode [ 628.252331][ T4513] device team_slave_1 left promiscuous mode [ 628.258946][ T4513] device veth0_to_hsr left promiscuous mode [ 628.265520][ T4513] device veth1_to_hsr left promiscuous mode [ 628.272007][ T4513] device hsr0 left promiscuous mode [ 628.277595][ T4513] device veth2 left promiscuous mode [ 628.303029][ T4513] device veth3 left promiscuous mode [ 628.317417][ T4513] device veth4 left promiscuous mode [ 628.335421][ T4513] device veth5 left promiscuous mode 09:18:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x300, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:13 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1700000000000000) [ 628.358518][ T4513] device veth6 left promiscuous mode [ 628.366843][ T4513] device veth7 left promiscuous mode [ 628.390650][ T4513] device veth8 left promiscuous mode [ 628.405075][ T4513] device veth9 left promiscuous mode 09:18:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:13 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1800000000000000) [ 628.623520][ T4539] validate_nla: 15 callbacks suppressed [ 628.623534][ T4539] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:13 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20], 0x1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 628.671095][ T4538] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x48000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:13 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1900000000000000) 09:18:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x40020000, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) [ 628.931676][ T4552] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 628.960141][ T4553] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4c000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 629.018665][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 629.018686][ T27] audit: type=1804 audit(1577179093.887:4138): pid=4556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/684/bus" dev="sda1" ino=16615 res=1 [ 629.139118][ T4562] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 629.168900][ T4566] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x700, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:14 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1a00000000000000) [ 629.476903][ T4579] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 629.495029][ T27] audit: type=1804 audit(1577179094.357:4139): pid=4578 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/685/bus" dev="sda1" ino=16635 res=1 [ 629.499335][ T4577] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:14 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20], 0x1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x65580000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 629.743847][ T4587] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 629.784832][ T4591] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:14 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1b00000000000000) 09:18:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0xffffff7f, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:18:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x68000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 629.975031][ T27] audit: type=1804 audit(1577179094.837:4140): pid=4601 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/686/bus" dev="sda1" ino=16628 res=1 09:18:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0xc02, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6c000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:15 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1c00000000000000) [ 630.463946][ T27] audit: type=1804 audit(1577179095.327:4141): pid=4623 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/687/bus" dev="sda1" ino=16638 res=1 09:18:15 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20], 0x1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x74000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7a000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0xffffffff, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:18:15 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1d00000000000000) 09:18:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 631.028073][ T27] audit: type=1804 audit(1577179095.897:4142): pid=4649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/688/bus" dev="sda1" ino=16618 res=1 09:18:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x3f00, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:16 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1e00000000000000) [ 631.421472][ T4666] device lo entered promiscuous mode [ 631.439741][ T27] audit: type=1804 audit(1577179096.307:4143): pid=4665 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/689/bus" dev="sda1" ino=16644 res=1 [ 631.456975][ T4666] device tunl0 entered promiscuous mode 09:18:16 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 631.530699][ T4666] device gre0 entered promiscuous mode [ 631.559670][ T4666] device gretap0 entered promiscuous mode [ 631.575779][ T4666] device erspan0 entered promiscuous mode [ 631.582650][ T4666] device ip_vti0 entered promiscuous mode [ 631.608388][ T4666] device ip6_vti0 entered promiscuous mode [ 631.625544][ T4666] device sit0 entered promiscuous mode 09:18:16 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x1f00000000000000) [ 631.640030][ T4666] device ip6tnl0 entered promiscuous mode [ 631.659159][ T4666] device ip6gre0 entered promiscuous mode [ 631.680638][ T4666] device syz_tun entered promiscuous mode [ 631.706006][ T4666] device ip6gretap0 entered promiscuous mode [ 631.712949][ T4666] device bridge0 entered promiscuous mode [ 631.769331][ T27] audit: type=1804 audit(1577179096.637:4144): pid=4679 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/690/bus" dev="sda1" ino=16644 res=1 [ 631.770835][ T4666] device vcan0 entered promiscuous mode [ 631.876218][ T4666] device bond0 entered promiscuous mode [ 631.884398][ T4666] device bond_slave_0 entered promiscuous mode [ 631.893944][ T4666] device bond_slave_1 entered promiscuous mode [ 631.902721][ T4666] 8021q: adding VLAN 0 to HW filter on device bond0 [ 631.913583][ T4666] device team0 entered promiscuous mode 09:18:16 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2000000000000000) [ 631.922489][ T4666] device team_slave_0 entered promiscuous mode [ 631.956122][ T4666] device team_slave_1 entered promiscuous mode [ 631.966222][ T4666] 8021q: adding VLAN 0 to HW filter on device team0 [ 631.973189][ T27] audit: type=1804 audit(1577179096.837:4145): pid=4686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/691/bus" dev="sda1" ino=16644 res=1 [ 631.991582][ T4666] device dummy0 entered promiscuous mode [ 632.004626][ T4666] device nlmon0 entered promiscuous mode [ 632.055386][ T4666] device caif0 entered promiscuous mode [ 632.061217][ T4666] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:18:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5865}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:17 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2100000000000000) 09:18:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x2}], 0x1}}], 0x1, 0x0) 09:18:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 632.277919][ T27] audit: type=1804 audit(1577179097.147:4146): pid=4695 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/692/bus" dev="sda1" ino=16641 res=1 09:18:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x4000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:17 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 632.435018][ T4702] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:18:17 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2200000000000000) 09:18:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb43b0000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 632.648297][ T27] audit: type=1804 audit(1577179097.517:4147): pid=4716 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/693/bus" dev="sda1" ino=16644 res=1 09:18:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6558}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 632.730533][ T4719] device lo left promiscuous mode [ 632.850360][ T4719] device tunl0 left promiscuous mode 09:18:17 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2300000000000000) [ 632.906932][ T4719] device gre0 left promiscuous mode [ 633.012400][ T4719] device gretap0 left promiscuous mode [ 633.076175][ T4719] device erspan0 left promiscuous mode [ 633.110511][ T4719] device ip_vti0 left promiscuous mode 09:18:18 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2400000000000000) [ 633.144057][ T4719] device ip6_vti0 left promiscuous mode [ 633.181139][ T4719] device sit0 left promiscuous mode [ 633.215820][ T4719] device ip6tnl0 left promiscuous mode [ 633.276802][ T4719] device ip6gre0 left promiscuous mode 09:18:18 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 633.327626][ T4719] device syz_tun left promiscuous mode 09:18:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x4002, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 633.403676][ T4719] device ip6gretap0 left promiscuous mode [ 633.461590][ T4719] device bridge0 left promiscuous mode [ 633.528079][ T4719] device vcan0 left promiscuous mode [ 633.564130][ T4719] device bond0 left promiscuous mode [ 633.569549][ T4719] device bond_slave_0 left promiscuous mode [ 633.575700][ T4719] device bond_slave_1 left promiscuous mode [ 633.603658][ T4719] device team0 left promiscuous mode [ 633.608998][ T4719] device team_slave_0 left promiscuous mode [ 633.615046][ T4719] device team_slave_1 left promiscuous mode [ 633.643303][ T4719] device dummy0 left promiscuous mode [ 633.671085][ T4719] device nlmon0 left promiscuous mode [ 633.701536][ T4719] device caif0 left promiscuous mode [ 633.707117][ T4722] validate_nla: 16 callbacks suppressed [ 633.707127][ T4722] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x3}], 0x1}}], 0x1, 0x0) 09:18:18 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2500000000000000) 09:18:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc3ffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 633.820219][ T4854] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 633.865457][ T4854] device lo entered promiscuous mode [ 633.892038][ T4854] device tunl0 entered promiscuous mode [ 633.901720][ T4854] device gre0 entered promiscuous mode [ 633.916029][ T4854] device gretap0 entered promiscuous mode [ 633.922813][ T4854] device erspan0 entered promiscuous mode [ 633.930223][ T4854] device ip_vti0 entered promiscuous mode [ 633.937658][ T4854] device ip6_vti0 entered promiscuous mode [ 633.945376][ T4854] device sit0 entered promiscuous mode [ 633.952501][ T4854] device ip6tnl0 entered promiscuous mode [ 633.962073][ T4854] device ip6gre0 entered promiscuous mode [ 633.969470][ T4854] device syz_tun entered promiscuous mode [ 633.976285][ T4854] device ip6gretap0 entered promiscuous mode [ 633.984812][ T4854] device bridge0 entered promiscuous mode 09:18:18 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2600000000000000) [ 633.992028][ T4854] device vcan0 entered promiscuous mode [ 633.998946][ T4854] device bond0 entered promiscuous mode [ 634.004631][ T4854] device bond_slave_0 entered promiscuous mode [ 634.012815][ T4854] device bond_slave_1 entered promiscuous mode [ 634.019849][ T4854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 634.029239][ T4854] device team0 entered promiscuous mode [ 634.034975][ T4854] device team_slave_0 entered promiscuous mode [ 634.062338][ T4854] device team_slave_1 entered promiscuous mode [ 634.069173][ T4854] 8021q: adding VLAN 0 to HW filter on device team0 [ 634.116971][ T4854] device dummy0 entered promiscuous mode [ 634.138336][ T4854] device nlmon0 entered promiscuous mode [ 634.143766][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 634.143788][ T27] audit: type=1804 audit(1577179099.007:4151): pid=4866 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/697/bus" dev="sda1" ino=16644 res=1 [ 634.205025][ T4854] device caif0 entered promiscuous mode [ 634.219594][ T4854] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:18:19 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r6], 0x1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 634.273288][ T4859] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:19 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2700000000000000) 09:18:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0xff03, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0ffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 634.425768][ T4872] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 634.539400][ T27] audit: type=1804 audit(1577179099.407:4152): pid=4880 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/698/bus" dev="sda1" ino=16640 res=1 [ 634.550638][ T4884] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfeffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 634.695056][ T4884] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 634.714814][ T4888] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 634.799282][ T27] audit: type=1804 audit(1577179099.667:4153): pid=4891 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/698/bus" dev="sda1" ino=16640 res=1 09:18:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8}], 0x1}}], 0x1, 0x0) 09:18:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 634.844472][ T4895] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:19 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2800000000000000) [ 634.905061][ T4895] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 634.964667][ T4897] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffa888}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 634.994634][ T27] audit: type=1804 audit(1577179099.857:4154): pid=4903 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/699/bus" dev="sda1" ino=16647 res=1 09:18:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 635.117571][ T4907] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 635.158563][ T4907] device lo left promiscuous mode [ 635.243756][ T4907] device tunl0 left promiscuous mode 09:18:20 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r6], 0x1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:20 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2900000000000000) [ 635.362515][ T4907] device gre0 left promiscuous mode 09:18:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x34000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 635.396652][ T27] audit: type=1804 audit(1577179100.267:4155): pid=4916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/700/bus" dev="sda1" ino=16640 res=1 [ 635.430695][ T4907] device gretap0 left promiscuous mode [ 635.563849][ T4907] device erspan0 left promiscuous mode 09:18:20 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2a00000000000000) [ 635.643213][ T4907] device ip_vti0 left promiscuous mode [ 635.729398][ T27] audit: type=1804 audit(1577179100.597:4156): pid=4930 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/701/bus" dev="sda1" ino=16640 res=1 [ 635.767491][ T4907] device ip6_vti0 left promiscuous mode 09:18:20 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2b00000000000000) [ 635.811225][ T4907] device sit0 left promiscuous mode [ 635.859355][ T4907] device ip6tnl0 left promiscuous mode [ 635.905550][ T4907] device ip6gre0 left promiscuous mode [ 635.928722][ T27] audit: type=1804 audit(1577179100.797:4157): pid=4961 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/702/bus" dev="sda1" ino=16640 res=1 [ 635.977434][ T4907] device syz_tun left promiscuous mode 09:18:20 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2c00000000000000) [ 636.018743][ T4907] device ip6gretap0 left promiscuous mode [ 636.061875][ T4907] device bridge0 left promiscuous mode [ 636.105888][ T4907] device vcan0 left promiscuous mode [ 636.137787][ T27] audit: type=1804 audit(1577179101.007:4158): pid=5042 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/703/bus" dev="sda1" ino=16640 res=1 [ 636.162534][ T4907] device bond0 left promiscuous mode [ 636.167891][ T4907] device bond_slave_0 left promiscuous mode [ 636.173937][ T4907] device bond_slave_1 left promiscuous mode [ 636.227547][ T4907] device team0 left promiscuous mode [ 636.232882][ T4907] device team_slave_0 left promiscuous mode [ 636.239545][ T4907] device team_slave_1 left promiscuous mode [ 636.273335][ T4907] device dummy0 left promiscuous mode 09:18:21 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2d00000000000000) [ 636.315842][ T4907] device nlmon0 left promiscuous mode [ 636.391674][ T4907] device caif0 left promiscuous mode [ 636.420755][ T4910] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 636.456032][ T27] audit: type=1804 audit(1577179101.327:4159): pid=5049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/704/bus" dev="sda1" ino=16640 res=1 09:18:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0xa}], 0x1}}], 0x1, 0x0) 09:18:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x40000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff7f}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:21 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r6], 0x1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8601}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:21 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2e00000000000000) [ 636.693504][ T5057] device lo entered promiscuous mode [ 636.702310][ T5057] device tunl0 entered promiscuous mode [ 636.709440][ T5057] device gre0 entered promiscuous mode [ 636.715959][ T5057] device gretap0 entered promiscuous mode [ 636.722802][ T5057] device erspan0 entered promiscuous mode [ 636.729878][ T5057] device ip_vti0 entered promiscuous mode [ 636.739433][ T5057] device ip6_vti0 entered promiscuous mode [ 636.749546][ T5057] device sit0 entered promiscuous mode [ 636.756516][ T5057] device ip6tnl0 entered promiscuous mode [ 636.763539][ T5057] device ip6gre0 entered promiscuous mode [ 636.770440][ T5057] device syz_tun entered promiscuous mode [ 636.791036][ T5057] device ip6gretap0 entered promiscuous mode [ 636.812759][ T27] audit: type=1804 audit(1577179101.677:4160): pid=5070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/705/bus" dev="sda1" ino=16640 res=1 [ 636.813313][ T5057] device bridge0 entered promiscuous mode [ 636.894118][ T5057] device vcan0 entered promiscuous mode [ 636.910138][ T5057] device bond0 entered promiscuous mode [ 636.923702][ T5057] device bond_slave_0 entered promiscuous mode [ 636.938239][ T5057] device bond_slave_1 entered promiscuous mode [ 636.952857][ T5057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 636.973365][ T5057] device team0 entered promiscuous mode [ 636.985971][ T5057] device team_slave_0 entered promiscuous mode 09:18:21 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x2f00000000000000) [ 637.000167][ T5057] device team_slave_1 entered promiscuous mode [ 637.014867][ T5057] 8021q: adding VLAN 0 to HW filter on device team0 [ 637.040167][ T5057] device dummy0 entered promiscuous mode [ 637.058057][ T5057] device nlmon0 entered promiscuous mode [ 637.115298][ T5057] device caif0 entered promiscuous mode [ 637.120965][ T5057] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:18:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff9e}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:22 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3000000000000000) 09:18:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x400300, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 638.039144][ T5083] device batadv0 entered promiscuous mode [ 638.045071][ T5083] device vxcan0 entered promiscuous mode [ 638.050759][ T5083] device vxcan1 entered promiscuous mode [ 638.056754][ T5083] device veth0 entered promiscuous mode [ 638.062379][ T5083] device veth1 entered promiscuous mode [ 638.068075][ T5083] device veth0_to_bridge entered promiscuous mode [ 638.074740][ T5083] device veth1_to_bridge entered promiscuous mode [ 638.081481][ T5083] device veth0_to_bond entered promiscuous mode [ 638.087969][ T5083] device veth1_to_bond entered promiscuous mode [ 638.094350][ T5083] device veth0_to_team entered promiscuous mode [ 638.100800][ T5083] device veth1_to_team entered promiscuous mode [ 638.107252][ T5083] device veth0_to_hsr entered promiscuous mode [ 638.113599][ T5083] device veth1_to_hsr entered promiscuous mode [ 638.119912][ T5083] device hsr0 entered promiscuous mode [ 638.125502][ T5083] device netdevsim0 entered promiscuous mode [ 638.131599][ T5083] device netdevsim1 entered promiscuous mode 09:18:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x700}], 0x1}}], 0x1, 0x0) 09:18:23 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:23 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3100000000000000) [ 638.137667][ T5083] device netdevsim2 entered promiscuous mode [ 638.143872][ T5083] device netdevsim3 entered promiscuous mode [ 638.150087][ T5083] device wlan0 entered promiscuous mode [ 638.155699][ T5083] device wlan1 entered promiscuous mode [ 638.161362][ T5083] device vti0 entered promiscuous mode [ 638.167186][ T5083] device vti1 entered promiscuous mode [ 638.172784][ T5083] device vti2 entered promiscuous mode [ 638.178341][ T5083] device veth2 entered promiscuous mode [ 638.183955][ T5083] device veth3 entered promiscuous mode 09:18:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffc3}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x1000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:23 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3200000000000000) [ 638.529172][ T5216] 8021q: adding VLAN 0 to HW filter on device bond0 [ 638.549902][ T5216] 8021q: adding VLAN 0 to HW filter on device team0 [ 638.625050][ T5216] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:18:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffff0}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 638.853945][ T5232] validate_nla: 9 callbacks suppressed [ 638.853959][ T5232] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:23 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3300000000000000) 09:18:24 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 639.603124][ T5233] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1a000}], 0x1}}], 0x1, 0x0) 09:18:24 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3400000000000000) 09:18:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x2000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x591e9a4}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 639.749480][ T5259] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 639.773674][ T27] kauditd_printk_skb: 5 callbacks suppressed [ 639.773694][ T27] audit: type=1804 audit(1577179104.637:4166): pid=5261 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/711/bus" dev="sda1" ino=16652 res=1 [ 639.804777][ T5262] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 639.924417][ T5269] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:24 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 640.016181][ T5272] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:25 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3500000000000000) [ 640.152967][ T5279] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 640.178160][ T5280] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 640.334890][ T5286] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 640.384402][ T27] audit: type=1804 audit(1577179105.247:4167): pid=5290 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/712/bus" dev="sda1" ino=16661 res=1 09:18:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x20000541}], 0x1}}], 0x1, 0x0) 09:18:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x3000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:25 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3600000000000000) 09:18:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 640.748251][ T5306] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 640.752850][ T27] audit: type=1804 audit(1577179105.617:4168): pid=5308 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/713/bus" dev="sda1" ino=16664 res=1 09:18:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:25 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="24000000280007040000", @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:25 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3700000000000000) [ 641.180882][ T27] audit: type=1804 audit(1577179106.047:4169): pid=5331 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/714/bus" dev="sda1" ino=16668 res=1 09:18:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x7ffff000}], 0x1}}], 0x1, 0x0) 09:18:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x7000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:26 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3800000000000000) 09:18:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 641.671077][ T27] audit: type=1804 audit(1577179106.537:4170): pid=5351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/715/bus" dev="sda1" ino=16668 res=1 09:18:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:26 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="24000000280007040000", @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0xfffffdef}], 0x1}}], 0x1, 0x0) 09:18:27 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3900000000000000) 09:18:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0xc020000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x65580000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 642.569393][ T27] audit: type=1804 audit(1577179107.437:4171): pid=5388 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/716/bus" dev="sda1" ino=16672 res=1 09:18:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:27 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3a00000000000000) 09:18:27 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="24000000280007040000", @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 642.973553][ T27] audit: type=1804 audit(1577179107.837:4172): pid=5412 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/717/bus" dev="sda1" ino=16671 res=1 09:18:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x2}}], 0x1, 0x0) 09:18:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x3f000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:28 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3b00000000000000) 09:18:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 643.562287][ T27] audit: type=1804 audit(1577179108.427:4173): pid=5435 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/718/bus" dev="sda1" ino=16681 res=1 09:18:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x86010000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:28 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400000000000000", @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:28 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3c00000000000000) [ 643.900920][ T5453] validate_nla: 25 callbacks suppressed [ 643.900934][ T5453] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 643.938727][ T5454] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 644.079994][ T27] audit: type=1804 audit(1577179108.947:4174): pid=5458 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/719/bus" dev="sda1" ino=16663 res=1 [ 644.179554][ T5463] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x3}}], 0x1, 0x0) 09:18:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 644.427709][ T5473] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 644.453628][ T5474] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x40000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:29 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x3f00000000000000) 09:18:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 644.554321][ T27] audit: type=1804 audit(1577179109.417:4175): pid=5482 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/720/bus" dev="sda1" ino=16671 res=1 09:18:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 644.597744][ T5486] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa4e99105}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 644.748794][ T5492] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 644.821324][ T5496] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 644.942199][ T5499] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:29 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x4000000000000000) 09:18:29 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400000000000000", @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 644.989158][ T5499] device lo left promiscuous mode [ 645.010764][ T5499] device tunl0 left promiscuous mode [ 645.027377][ T5499] device gre0 left promiscuous mode [ 645.058453][ T27] audit: type=1804 audit(1577179109.927:4176): pid=5504 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/721/bus" dev="sda1" ino=16679 res=1 [ 645.059969][ T5499] device gretap0 left promiscuous mode [ 645.135486][ T5499] device erspan0 left promiscuous mode [ 645.159235][ T5499] device ip_vti0 left promiscuous mode [ 645.190736][ T5499] device ip6_vti0 left promiscuous mode [ 645.209083][ T5499] device sit0 left promiscuous mode [ 645.216500][ T5499] device ip6tnl0 left promiscuous mode [ 645.222122][ T5499] device ip6gre0 left promiscuous mode [ 645.246228][ T5499] device syz_tun left promiscuous mode [ 645.261255][ T5499] device ip6gretap0 left promiscuous mode [ 645.278462][ T5499] device bridge0 left promiscuous mode [ 645.284542][ T5499] device vcan0 left promiscuous mode [ 645.290206][ T5499] device bond0 left promiscuous mode [ 645.300715][ T5499] device team0 left promiscuous mode [ 645.306539][ T5499] device dummy0 left promiscuous mode [ 645.312179][ T5499] device nlmon0 left promiscuous mode [ 645.318057][ T5499] device caif0 left promiscuous mode [ 645.323716][ T5499] device batadv0 left promiscuous mode [ 645.329531][ T5499] device vxcan0 left promiscuous mode [ 645.335162][ T5499] device vxcan1 left promiscuous mode [ 645.340630][ T5499] device veth0 left promiscuous mode [ 645.347038][ T5499] device veth1 left promiscuous mode [ 645.352838][ T5499] device veth0_to_bridge left promiscuous mode [ 645.359291][ T5499] device veth1_to_bridge left promiscuous mode [ 645.365716][ T5499] device veth0_to_bond left promiscuous mode [ 645.371752][ T5499] device bond_slave_0 left promiscuous mode [ 645.377849][ T5499] device veth1_to_bond left promiscuous mode [ 645.383872][ T5499] device bond_slave_1 left promiscuous mode [ 645.389966][ T5499] device veth0_to_team left promiscuous mode [ 645.396375][ T5499] device team_slave_0 left promiscuous mode [ 645.402338][ T5499] device veth1_to_team left promiscuous mode [ 645.408424][ T5499] device team_slave_1 left promiscuous mode [ 645.414379][ T5499] device veth0_to_hsr left promiscuous mode [ 645.420537][ T5499] device veth1_to_hsr left promiscuous mode [ 645.428014][ T5499] device hsr0 left promiscuous mode [ 645.433402][ T5499] device netdevsim0 left promiscuous mode [ 645.439322][ T5499] device netdevsim1 left promiscuous mode [ 645.445149][ T5499] device netdevsim2 left promiscuous mode [ 645.451302][ T5499] device netdevsim3 left promiscuous mode [ 645.465107][ T5499] device wlan0 left promiscuous mode [ 645.470465][ T5499] device wlan1 left promiscuous mode [ 645.475907][ T5499] device vti0 left promiscuous mode [ 645.481164][ T5499] device vti1 left promiscuous mode [ 645.486501][ T5499] device vti2 left promiscuous mode [ 645.491754][ T5499] device veth2 left promiscuous mode [ 645.497275][ T5499] device veth3 left promiscuous mode [ 645.502724][ T5505] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x8}}], 0x1, 0x0) 09:18:30 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x4800000000000000) 09:18:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x40020000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 645.689245][ T27] audit: type=1804 audit(1577179110.557:4177): pid=5522 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/722/bus" dev="sda1" ino=16663 res=1 09:18:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:30 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400000000000000", @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:30 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x4c00000000000000) 09:18:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 646.212495][ T27] audit: type=1804 audit(1577179111.077:4178): pid=5555 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/723/bus" dev="sda1" ino=16701 res=1 09:18:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0xa}}], 0x1, 0x0) 09:18:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:31 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x6800000000000000) 09:18:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0xff030000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc3}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 646.635157][ T27] audit: type=1804 audit(1577179111.507:4179): pid=5574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/724/bus" dev="sda1" ino=16698 res=1 09:18:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:31 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/18, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:31 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x6c00000000000000) 09:18:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 647.138287][ T27] audit: type=1804 audit(1577179112.007:4180): pid=5595 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/725/bus" dev="sda1" ino=16530 res=1 09:18:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x700}}], 0x1, 0x0) 09:18:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x2}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:32 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x7400000000000000) 09:18:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0xffffff7f, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3bb4}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 647.598554][ T5617] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 647.618889][ T27] audit: type=1804 audit(1577179112.487:4181): pid=5618 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/726/bus" dev="sda1" ino=16697 res=1 09:18:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x3}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 647.788283][ T5629] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:32 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/18, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x4}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:32 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x7a00000000000000) 09:18:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 648.032759][ T27] audit: type=1804 audit(1577179112.897:4182): pid=5639 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/727/bus" dev="sda1" ino=16578 res=1 09:18:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1a000}}], 0x1, 0x0) 09:18:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x10}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xf4ffffff00000000) 09:18:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x4000000000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 648.577343][ T27] audit: type=1804 audit(1577179113.447:4183): pid=5661 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/728/bus" dev="sda1" ino=16641 res=1 09:18:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5865}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x25}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 648.769456][ T5674] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:33 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/18, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6558}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x2f}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:33 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xf6ffffff00000000) [ 648.975620][ T5686] validate_nla: 23 callbacks suppressed [ 648.975632][ T5686] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 648.999457][ T27] audit: type=1804 audit(1577179113.867:4184): pid=5688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/729/bus" dev="sda1" ino=16694 res=1 [ 649.029793][ T5682] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x20000541}}], 0x1, 0x0) 09:18:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x5b}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:34 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xfeffffff00000000) 09:18:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x40030000000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 649.504599][ T27] audit: type=1804 audit(1577179114.367:4185): pid=5703 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/730/bus" dev="sda1" ino=16676 res=1 [ 649.560107][ T5707] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 649.582336][ T5708] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8f0}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:34 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xff00000000000000) [ 649.714245][ T5718] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 649.729346][ T5717] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:34 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/19, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x900}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 649.888222][ T5726] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 649.979159][ T5731] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 650.031074][ T5734] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x7ffff000}}], 0x1, 0x0) 09:18:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x910}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:35 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xff0f000000000000) 09:18:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x100000000000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 650.478699][ T5746] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 650.512820][ T27] kauditd_printk_skb: 1 callbacks suppressed 09:18:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x928}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 650.512841][ T27] audit: type=1804 audit(1577179115.377:4187): pid=5751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/732/bus" dev="sda1" ino=16711 res=1 [ 650.559031][ T5750] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb43b}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:35 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xffffff7f00000000) [ 650.683395][ T5759] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 650.712854][ T5763] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:35 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/19, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x92c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 650.797666][ T27] audit: type=1804 audit(1577179115.667:4188): pid=5766 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/733/bus" dev="sda1" ino=16711 res=1 09:18:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 650.900622][ T5769] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 650.926369][ T5772] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 651.052035][ T5778] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0xfffffdef}}], 0x1, 0x0) 09:18:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x960}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:36 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xffffffff00000000) 09:18:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x200000000000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 651.423703][ T5795] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 651.445647][ T27] audit: type=1804 audit(1577179116.317:4189): pid=5794 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/734/bus" dev="sda1" ino=16712 res=1 09:18:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x9a4}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:36 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/19, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xb50}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:36 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0xffffffffffffffff) [ 651.874611][ T27] audit: type=1804 audit(1577179116.737:4190): pid=5820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/735/bus" dev="sda1" ino=16720 res=1 09:18:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x2}}], 0x1, 0x0) 09:18:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xb60}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:37 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x3, 0x3, 0x2}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r5, 0x8}, 0x8) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:18:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x300000000000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 652.384285][ T27] audit: type=1804 audit(1577179117.247:4191): pid=5836 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/736/bus" dev="sda1" ino=16734 res=1 09:18:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xb70}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xb88}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 652.607555][ T5852] __nla_validate_parse: 5 callbacks suppressed [ 652.607596][ T5852] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:37 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xb8c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:37 executing program 1: ftruncate(0xffffffffffffffff, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='sec\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x2, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000000)={0x5104, "a380e6fc5707bd3ed052de9a2ab157cfc43313e04369e54cbb2905375e8b7f38", 0x2, 0x2}) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 652.773815][ T5861] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x3}}], 0x1, 0x0) 09:18:38 executing program 1: creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000100)=@v2={0x5, 0x2, 0xe, 0xffff1263, 0xc1, "6c784cf93aca9e58422ef22e1494c903c75acefeb64cf884d9dcc157a85224f236751caa118137efe2a7666bb6efa3cce3533d2d1e9eb33665d652d16780bb81b020ba2d75a6866ddee8e2a519b04ddb6260e7c555c32707ce1a155bf95c9b6a74ba9993341d92ad07e9c519d209d004fa460c049ce41cfa8ed5beacb0fa72fa217b87ba8b1a40c290394c8263d010567f7fc2f4bac50a4055821dadd07eb621c3901cd80a7094168cbdda92a73eb96d4a7bdc44423ed16b85d31fdc1536147b1f"}, 0xfffffffffffffd6b, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) r1 = request_key(&(0x7f00000002c0)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='^\x00', 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0xfffffffffffffd99, r1) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r0, r2}, &(0x7f0000001b40)=""/250, 0xfa, &(0x7f0000000580)={&(0x7f0000000080)={'xxhash64-generic\x00'}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x3d, 0x0, 0x19d3, 0x3, 0x4, 0x1, 0x1, [], 0x0, r4, 0x4, 0x5}, 0x3c) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={r5, &(0x7f0000000480)="661222065c607f3ee2d75960189d1006803d4ef01c607d1ede14d2feac354efb6a30468f879df7559811db2325a8d6a1fe7c6b9d311cb6d909297c0268f40fb3a69c9d54054b390069c26dc74a9679f3bd0cc63629789f12163cc52cb5bdff307d1afc48d09f29111f7766ad30f4a35210d12e0c5e33264814", &(0x7f00000005c0)=""/240, 0x4}, 0x20) r6 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r7 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)='F', 0x1, r6) keyctl$read(0xb, r7, 0x0, 0x0) r8 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$search(0xa, r2, &(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x2}, r8) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:18:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xbc0}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x700000000000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 653.375653][ T5882] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 653.390961][ T27] audit: type=1804 audit(1577179118.257:4192): pid=5881 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/738/bus" dev="sda1" ino=16750 res=1 09:18:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xbe8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:38 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x400) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000040)={0x5, 0x6, 0x2}) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="140a3d7c664c5039cd88ad14a98512a56e4cda79e8e77d694a70281e3d00809e56649d7d18725a6782cb7d6d5789bc5379a5a1787c281eec6b0f45e3dc32822fb6d66033460887352669027f090ed3c9ce66b8fa6ab20370eb5a13c611a8c06550a8c3c9785431a20d49a40e9d56de01dfc5415691bc1542f0c526cca4548da9d8ee4e469594f5f045491743905c173a7eb8db3b075fe48b0ea01fe88e42cb54ad8dda98deb8ec1151ea169ca465cf826566bbfe158afd1a8138ebfb8b95"], 0x13b, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000980)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, 0x0) ioprio_set$uid(0x3, r7, 0x80000001) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@remote, 0x4e24, 0x0, 0x4e21, 0x3, 0xa, 0x20, 0x20, 0xff, 0x0, r7}, {0x5, 0xff, 0x101, 0xfffffffffffffa2b, 0x8, 0x4, 0x1, 0xffffffff}, {0x4, 0x1c47, 0x101, 0x8000}, 0x8000, 0x6e6bb7, 0x2, 0x1, 0x3, 0x3}, {{@in6=@local, 0x4d5, 0x33}, 0x0, @in6=@loopback, 0x3506, 0x5e7a97e7fdc65fee, 0x3, 0x7, 0x1, 0xc9, 0x4}}, 0xe8) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r12}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r12, @ANYBLOB="08000200e000000238489d4aff2c2461bf01a07ca92469a363a3ccfb6bdc43fcb38a5380c97b272039b15228849bd9545eaf370aa01a6c184a"], 0x20}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r12}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00001ed000/0x4000)=nil, 0x4000, 0x0, 0x4012, r13, 0x0) [ 653.456704][ T27] audit: type=1804 audit(1577179118.257:4193): pid=5886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/738/bus" dev="sda1" ino=16750 res=1 [ 653.549219][ T27] audit: type=1804 audit(1577179118.417:4194): pid=5894 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/739/bus" dev="sda1" ino=16741 res=1 [ 653.572338][ T5897] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:38 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xbf0}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 653.863204][ T5910] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x20c}}], 0x1, 0x0) 09:18:39 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00'], 0x1, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:18:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0xc02000000000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xbf8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 654.349539][ T5926] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 654.365014][ T27] audit: type=1804 audit(1577179119.237:4195): pid=5927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/740/bus" dev="sda1" ino=16763 res=1 [ 654.369809][ T5925] validate_nla: 10 callbacks suppressed [ 654.369819][ T5925] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc00}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:39 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="b0d5a625fef85d2b29daff4f5ff7e1bbb61046c2b84492dcec2383107150c2636faf6cb2bddc"], 0x13b, 0x0) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x5, 0x18d00) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e22, @empty}, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000140)='vlan0\x00', 0x3441}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x376ef3daf819da42, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x200, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x58, r3, 0x4, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xa0}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x14000901) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup(r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, 0x0) ioprio_set$uid(0x3, r8, 0x80000001) mount$9p_rdma(&(0x7f0000000300)='127.0.0.1\x00', &(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='9p\x00', 0xd6fd7b2d105a2e66, &(0x7f0000000600)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@common=@version_u='version=9p2000.u'}, {@rq={'rq', 0x3d, 0x74}}, {@rq={'rq', 0x3d, 0x4281c}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x7fffffff}}, {@rq={'rq', 0x3d, 0x800}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@appraise_type='appraise_type=imasig'}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '127.0.0.1\x00'}}]}}) sendmsg$nl_xfrm(r1, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100040080}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)=@migrate={0x18c, 0x21, 0x10, 0x70bd2a, 0x25dfdbfe, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}, 0x4e22, 0xfffd, 0x4e23, 0x1, 0x2, 0x20, 0x0, 0x8, 0x0, r8}, 0x6e6bb8, 0x2}, [@extra_flags={0x8, 0x18, 0x7}, @lastused={0xc, 0xf, 0x9}, @algo_aead={0xe8, 0x12, {{'aegis128-generic\x00'}, 0x4d0, 0x100, "6dc54e6e81217a0846e8b7ac6295264e86d96169f0781aaeda4726c1b91f056865da27d2040c2baf9a81f396b63ae682ea60527ac2b0f009187610e37c9f319c1fe029c6f4795971322065c653d23527e9d7af7e85dcad838270b16cef043794b56401024e4672c1735bcfffc6117030d7320fad53c13a24304659a95cf65704974c23db6fbbf741183c007e54db34db89eb4455872ab85acfab"}}, @policy_type={0xc, 0x10, {0x1}}, @address_filter={0x28, 0x1a, {@in6=@empty, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2, 0x0, 0x40}}, @mark={0xc, 0x15, {0x35075d, 0x7fff}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x20000803}, 0x40) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000000)={0x4, 0x0, [{0x825, 0x0, 0xefc}, {0xa49, 0x0, 0x7}, {0x94d, 0x0, 0x3f}, {0x4000074f, 0x0, 0x3}]}) [ 654.550606][ T5937] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:39 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 654.611935][ T5939] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc04}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 654.668680][ T27] audit: type=1804 audit(1577179119.537:4196): pid=5943 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/741/bus" dev="sda1" ino=16700 res=1 09:18:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 654.759385][ T5949] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc08}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 654.822172][ T5953] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 654.891331][ T5957] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x240}}], 0x1, 0x0) 09:18:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x65580000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:40 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="be0ca8e19bdfc4372d435c09c29c"], 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_LINK(r2, 0x40044160, &(0x7f0000000000)=0x4) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x5c10309476f8d5ce, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) 09:18:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc10}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x3f00000000000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc18}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 655.294036][ T5973] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 655.331077][ T5970] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc20}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:40 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(0xffffffffffffffff) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:40 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$x25(r2, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) [ 655.533780][ T5986] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc24}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 655.690959][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 655.691012][ T27] audit: type=1804 audit(1577179120.557:4199): pid=5994 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/743/bus" dev="sda1" ino=16770 res=1 [ 655.792463][ T6002] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 655.861806][ T27] audit: type=1804 audit(1577179120.727:4200): pid=5998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/743/bus" dev="sda1" ino=16770 res=1 09:18:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc28}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:41 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) lstat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:18:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x300}}], 0x1, 0x0) 09:18:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x4000000000000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 656.271392][ T27] audit: type=1804 audit(1577179121.137:4201): pid=6014 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/744/bus" dev="sda1" ino=16779 res=1 [ 656.289916][ T6018] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc2c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 656.374165][ T27] audit: type=1804 audit(1577179121.237:4202): pid=6024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/744/bus" dev="sda1" ino=16779 res=1 09:18:41 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(0xffffffffffffffff) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 656.453214][ T6031] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc30}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:41 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg$kcm(r2, &(0x7f0000000280)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/2, 0x2}], 0x1, &(0x7f0000000180)=""/193, 0xc1}, 0x121) [ 656.604694][ T6038] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc34}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 656.758507][ T27] audit: type=1804 audit(1577179121.617:4203): pid=6044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/745/bus" dev="sda1" ino=16779 res=1 [ 656.774592][ T6047] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc38}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 657.015174][ T27] audit: type=1804 audit(1577179121.877:4204): pid=6049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/745/bus" dev="sda1" ino=16779 res=1 09:18:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0xc02}}], 0x1, 0x0) 09:18:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb43b0000}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc3c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:42 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='secu\a\x00\x00\x00.ima\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r1 = fanotify_init(0x20, 0x80000) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100, 0x40000) sendfile(r1, r2, &(0x7f0000000040), 0x4) ioctl$SNDRV_PCM_IOCTL_XRUN(r0, 0x4148, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 657.276731][ T27] audit: type=1804 audit(1577179122.147:4205): pid=6073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/746/bus" dev="sda1" ino=16805 res=1 09:18:42 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(0xffffffffffffffff) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x4002000000000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc40}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 657.405432][ T27] audit: type=1800 audit(1577179122.277:4206): pid=6073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16805 res=0 09:18:42 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000100)={0xa10000, 0x5, 0x43, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9e0904, 0x5, [], @p_u32=&(0x7f0000000000)=0xfffffff7}}) ioctl$int_out(r1, 0xa8c0, &(0x7f0000000140)) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:18:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc44}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc48}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 657.616813][ T27] audit: type=1804 audit(1577179122.487:4207): pid=6096 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/747/bus" dev="sda1" ino=16805 res=1 [ 657.739377][ T6101] __nla_validate_parse: 11 callbacks suppressed [ 657.739435][ T6101] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x3f00}}], 0x1, 0x0) 09:18:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:43 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0x7}, 0x2, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:18:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc4c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 658.161025][ T6111] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 658.172123][ T27] audit: type=1804 audit(1577179123.037:4208): pid=6113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/748/bus" dev="sda1" ino=16823 res=1 09:18:43 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc50}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:43 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x400d20, 0x0) 09:18:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0xff03000000000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 658.478393][ T6129] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:43 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0xe4) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:18:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc54}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 658.672737][ T6146] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x4000}}], 0x1, 0x0) 09:18:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc58}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:44 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) recvfrom$unix(r0, &(0x7f0000000100)=""/181, 0xb5, 0x40000001, &(0x7f00000001c0)=@abs={0x2, 0x0, 0x4e22}, 0x6e) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000000)={0x0, {0x41cb, 0x87b, 0xfffffffd, 0x8001}, {0x1, 0xc14, 0x8, 0x8}, {0x80000001, 0xffffffff}}) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 659.221450][ T6158] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:44 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc3}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc5c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0xffffff7f00000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x8c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x100, @empty, 0x4}, @in6={0xa, 0x4e23, 0x100, @remote, 0x4}, @in6={0xa, 0x4e21, 0xe0000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffff}, @in6={0xa, 0x4e22, 0x0, @mcast1, 0x5}, @in6={0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffff}]}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0xfffa, 0x8, 0x8, 0x3b2, 0x7, 0x8, 0x4, 0x0, r2}, &(0x7f0000000200)=0x20) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r3, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 659.459923][ T6170] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 659.487219][ T6174] validate_nla: 8 callbacks suppressed [ 659.487231][ T6174] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:18:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc60}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 659.629404][ T6183] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc64}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 659.672076][ T6188] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 659.829490][ T6192] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x4002}}], 0x1, 0x0) 09:18:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc68}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:45 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@ng={0x4, 0xa, "d4f53acbd13e33e1dd70eea1e54e000000000000"}, 0x16, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000100)={0xd, 0x1, {0x7c27491c84969ff3, 0xfff, 0x4320, {0x0, 0x81}, {0x7, 0xb3}, @period={0x5a, 0x0, 0x101, 0x7ff, 0x7fff, {0x4, 0xffff, 0x7c, 0x401}, 0x2, &(0x7f0000000000)=[0x7ff, 0xfffe]}}, {0x56, 0x4, 0x7fff, {0xff7f, 0x6}, {0xff80, 0x6}, @period={0x59, 0x401, 0x595, 0x6, 0x4, {0xb793, 0x4, 0x7, 0x200}, 0x1, &(0x7f0000000040)=[0x9]}}}) open$dir(&(0x7f0000000180)='./bus\x00', 0x100, 0x44) [ 660.212187][ T6204] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 660.234169][ T6203] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:45 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc6c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x2}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0xffffffff00000000, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 660.431986][ T6217] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:18:45 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000000)={0x55, 0x1112, 0x8, "eaa45c030ac9516357cb49235979473e583e12fc8de3996d6544763a11bfc0a6b83ddc62370caece70ceacbf40f17fae8d7b35fa7093640ea4e8562bc327bb62494ff5cf29e125dab5b1705dec0378484891f81944"}) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) sendfile(r3, r5, &(0x7f0000000100)=0x3, 0xffffffff) 09:18:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x3}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc70}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc74}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 660.826783][ T27] kauditd_printk_skb: 9 callbacks suppressed [ 660.826803][ T27] audit: type=1804 audit(1577179125.697:4218): pid=6236 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/754/bus" dev="sda1" ino=16844 res=1 09:18:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x4}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc78}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x34000}}], 0x1, 0x0) 09:18:45 executing program 1: creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) ftruncate(r1, 0x100ffc) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 661.148252][ T6255] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 661.171654][ T27] audit: type=1804 audit(1577179126.037:4219): pid=6254 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/755/bus" dev="sda1" ino=16846 res=1 09:18:46 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r5, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r5], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r1) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) 09:18:46 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x43) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) ioctl$TUNSETOWNER(r1, 0x400454cc, 0xee00) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000100)=@v2={0x5, 0x2, 0x9, 0x6, 0xe0, "b036fe925469256d4deac73abfc9cd3d205abb74eb6b3a0fef3932bbb20113e0f2e563545bf479fcd8c153565ad646362d326b78164fedc862150bf8df8336c4956daaed59b9573747b024d6c5cc325ea96e27d7e35383a25a8ac6232a7596a861497a74f3a6b1de1730b4a7ab13491c8db580b96aaae6441b3f723c9c6bd81d0397db142d0435ab5f0a314c5765ddc13b95ce09975ae5f83761e2c62687d68f566cd7654f10d4b6dd4f8f157050950840b5f207a72e795991e2b89846c3723dcd2dbf01837f28c872ded9e8f29490482387fe624fe1d702fe7ecbe9327764e6"}, 0xea, 0x0) 09:18:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x10}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0xffffffffffffffff, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc7c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc80}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 661.414613][ T27] audit: type=1804 audit(1577179126.277:4220): pid=6274 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/756/bus" dev="sda1" ino=16870 res=1 [ 661.439538][ T6272] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 09:18:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x25}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x2f}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 661.634512][ T27] audit: type=1804 audit(1577179126.497:4221): pid=6277 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/756/bus" dev="sda1" ino=16870 res=1 09:18:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc84}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:46 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="047b"], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 661.849341][ T27] audit: type=1804 audit(1577179126.717:4222): pid=6297 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/757/bus" dev="sda1" ino=16865 res=1 09:18:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x400300}}], 0x1, 0x0) 09:18:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x5b}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:47 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r5, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r5], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r1) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) 09:18:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc88}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:47 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0xf}) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 662.256841][ T27] audit: type=1804 audit(1577179127.127:4223): pid=6312 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/758/bus" dev="sda1" ino=16876 res=1 09:18:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x11}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8f0}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc94}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc9c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 662.463467][ T27] audit: type=1804 audit(1577179127.327:4224): pid=6325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/758/bus" dev="sda1" ino=16876 res=1 09:18:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x900}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x910}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xca0}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 662.801928][ T6339] __nla_validate_parse: 17 callbacks suppressed [ 662.801942][ T6339] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x1000000}}], 0x1, 0x0) 09:18:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x92c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 663.047268][ T6348] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:18:48 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r5, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r5], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r1) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) 09:18:48 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = shmget(0x2, 0xd000, 0x800, &(0x7f0000ff3000/0xd000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getrlimit(0x6, &(0x7f0000000080)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) setxattr$security_ima(&(0x7f0000000540)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="040a99a5e963e331116ae63fc9d51263e9399a2c9153441a48ba5f2141ea3f656a308316c04d6c30b4ba675400db889bee9288b074815143f603280bf06f786d524b93e190521192bb500184bff34e3aacf108b18781a2e403e11395fc4aeed77c498fb219e8fbbca75d778815f9db65d437f8d14d1acd634d6222f986f7060c9907948de361d37f2d7a74770d1b5e4fc4ac13fb03f1ae65a5e25e3858e58b476e611dfa5497f9985b866dcd8869f50b2386447383e9b932"], 0x1, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x100) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmsg$kcm(r4, &(0x7f0000000440)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)=""/139, 0x8b}, {&(0x7f00000001c0)=""/207, 0xcf}, {&(0x7f00000002c0)=""/46, 0x2e}, {&(0x7f0000000300)=""/60, 0x3c}], 0x4, &(0x7f0000000380)=""/76, 0x4c}, 0x2) 09:18:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xdd4}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 663.187098][ T6354] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 663.255275][ T6356] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:18:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x960}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xddc}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 663.324611][ T27] audit: type=1804 audit(1577179128.187:4225): pid=6356 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/759/bus" dev="sda1" ino=16883 res=1 [ 663.423490][ T6366] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 663.445318][ T6367] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:18:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe04}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x9a4}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 663.615452][ T6374] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe08}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 663.757264][ T27] audit: type=1804 audit(1577179128.627:4226): pid=6377 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/759/bus" dev="sda1" ino=16883 res=1 [ 663.763155][ T6378] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:18:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe0c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 663.866105][ T6381] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x2000000}}], 0x1, 0x0) 09:18:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xb50}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:49 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) write$binfmt_elf64(r0, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x68, 0x77, 0x3, 0x6, 0x5, 0x3, 0x21, 0x7, 0x279, 0x40, 0x1d6, 0xfffffff7, 0x101, 0x38, 0x2, 0x401, 0x101, 0xffff}, [{0x4, 0x1, 0xfffffffffffffff9, 0x2, 0x5, 0xffffffff00000001, 0x7ff, 0x4}, {0x4, 0x7f, 0x4, 0xfffffffffffffffa, 0x802, 0x400, 0x0, 0x2}], "c2a946c0a06e965075a2343008dac80fe2f63b1547a68d50836c7407e406ef97e2236b9c6acebbb4cfa33ca1f4d978c444b59d30ada786cef3089e973f2b2db61cc2d91cd78fe0038932b351d5100f402371c46f7298237cde1856079f54e8b34f8343798ef6cd3a8603293e0106e035b2ba13747cf76adef2a630ad8637435319cd70d075f3f7328ec9d0760532cb29b51d779f4573465c48d62530b9291b9fbbbffd41c2c5f674faf707df1efc375639f1e3bec836a1f8c30622017289171620f4642bb1d4bb8f18"}, 0x179) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:18:49 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 664.081501][ T6389] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe10}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 664.183755][ T6393] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 664.194259][ T27] audit: type=1804 audit(1577179129.067:4227): pid=6394 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/760/bus" dev="sda1" ino=16899 res=1 09:18:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x2}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xb60}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe14}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe18}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xb70}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:49 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) sendmmsg(r0, &(0x7f0000000380)=[{{&(0x7f0000000200)=@ll={0x11, 0xf2, r1, 0x1, 0x1, 0x6, @remote}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000040)="2f944bb4e51b0c351039d742178eb2a68c4fbb6dbdb9643fc4d94bdc1078d8aa452094c2dde8a144d130190ff81ccdbb85de98f7e8", 0x35}], 0x1, &(0x7f00000002c0)=[{0xa8, 0x4e2803f799e6b12b, 0x0, "5270e5e189d2847e631a652324645d81516aca4f381e52b16c045cbfb5d920ec48dfe0ba8a948938a47b54a3ead3dc014a1e535ed6705209728e4feecd505c5c2365592bf297cb776d17efc24d46ef89f806d9a5ba7b5e2fcbdba02a90f51cfe1617c6bda3ada4a19e750be44844cc541c379330ae9a40b42b5787a43d55f61c542f7e19679a3a552ba247efe9d2d4cc10cb4a3668db"}], 0xa8}}], 0x1, 0x40001) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:18:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe1c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x3000000}}], 0x1, 0x0) 09:18:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xb8c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe20}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:50 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:50 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, 0x0) ioprio_set$uid(0x3, r1, 0x80000001) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, 0x0) ioprio_set$uid(0x3, r2, 0x80000001) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./bus\x00', 0x1, 0x8, &(0x7f0000000600)=[{&(0x7f0000000100)="1d85a20deb4146bc8724d1a9d022591a3153961387b37b6f7044dcf141359f79a9181edd31af71d61229ba89287188087c66cd2554d4bd8e4776ce3b49abdbaae36970443caf388f95a2b628d7eb3f04119a65dfec372c4b5cb3c8cfbacf4efd389072d8661669e9679ef3544f8bf0cd7976205892a1b617d32956175726d286ea371bc07cf8942214ba48cff87cad", 0x8f, 0x1}, {&(0x7f00000001c0)="446c656c96cfa37fae2f502351f4930dd2aec08e08b4806c00d0ad999a5b672215910d4fbe539f0fdaccdfa5202db8b596004873f6a10fab505f0c2c9ca44c81550920825e34db0ec5dc0883deb3b49c4526cd5cde30680980c9cfa43fa1fcaf091a982bfa282d297ed1f4a33f9fdfb3e43b6197367c10ace9ccab9fc42d962afadfe2167424304f6d8b64c3fb2703499ec33ae451f4e6e952853380", 0x9c, 0x3}, {&(0x7f0000000280)="855ab23b45f9d7d9337c380ce8f6510891ba78e6c0283557655fe7c84ff09cbfcfdc880c4fe861924a580878666d5ce0a768aeebc7045f370fd2896719bdf639230bb00db4cab5a7c55330d16b4cfc3767ec3400f86ba4b7034614dc49b31a01adb13185cadbf6adfe2a6d8eaf3588c39c03e83f88613702d5a1b50ff931f7131d10591f4abc39efff4b065fc4e1cb6b2d3c07", 0x93}, {&(0x7f0000000440)="c5a80c5880d4257540c0630a26cf5f360f329b6f23597cdf819a3439b774d4fb4ccaa45f936dbde6d63642af3a452ed40a7d9cd99a10b42a1140f3e6217f9844de14ea972d802dec53b4a3dc9766eb53ef841ecf3735d933c953af68d4269e1826ca4a3888950eb061c0311fbb612433054af5e7e92bfd0ca9c5fc0cafa5e961846e620cdab2ab7af1f02f5046bafa734b280e0c78c09179adab666a1ab4295edfbbf4d5dea0bc99aae38a40ae7755ed0438d8efd01ff3ad332296bc471b74eaa7048ef9947206a235dfdca24f0e274783c315d948bcb7d5891cc4ceec91", 0xde, 0xfffffffffffffff9}, {&(0x7f0000000340)="8c6cbeb78e869ac775ad07cb78e2989506725fe4101836b00f58dea816dbb5f5c245932e0607b39c7c295abd3d2f6d3b1cf56ebd6d81397346e40bab", 0x3c, 0x101}, {&(0x7f0000000380)="648adbc5c98e599d531f227572664237135cd4df893b2d932ee7e9cf08ca201abfc6c79fc6fc93abebe0a076cffcfe0402e9c4038f9f71da27efba930d0fd7198b71580452cdc310", 0x48, 0x4}, {&(0x7f0000000540)="40faef60a0c52fb554107f15262539d244ce0052e4884037539e6d72e8288a9dd9fbfbe57f280a7523eeee8f34b5a9fc18f2ceddb05161285ab710c2f2b17f933610742fb952581c853883557aa5e9791c6d957a98adf68ffae002262c7e88f50811fab46e0f10d2b4b198", 0x6b, 0x7a906211}, {&(0x7f00000005c0)="567d1317db39a53a5885bceebea99afe1421896f1cbca1b77f13af", 0x1b, 0x7fff}], 0x80, &(0x7f00000006c0)={[{@nodiscard='nodiscard'}, {@extent_cache='extent_cache'}, {@background_gc_on='background_gc=on'}, {@test_dummy_encryption='test_dummy_encryption'}, {@flush_merge='flush_merge'}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}, {@euid_lt={'euid<', r1}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@euid_lt={'euid<', r2}}]}) [ 665.324482][ T6449] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 665.354458][ T6449] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 09:18:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x3}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe24}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xbc0}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 665.384658][ T6449] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 665.428142][ T6449] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 09:18:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xbe8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe30}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 665.717372][ T6473] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 665.731394][ T6473] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 09:18:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xbf0}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe34}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 665.758059][ T6473] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 665.791829][ T6473] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 09:18:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0xc020000}}], 0x1, 0x0) 09:18:51 executing program 1: r0 = msgget$private(0x0, 0x204) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000002c0)=""/106) fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) statx(r3, &(0x7f0000000040)='./bus\x00', 0x0, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) statx(0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x1000, 0x8, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) acct(&(0x7f00000003c0)='./bus\x00') msgctl$IPC_SET(r0, 0x1, &(0x7f0000000340)={{0x0, r1, r4, r5, r6, 0x41, 0x8}, 0x0, 0x0, 0x7fff, 0x2, 0xfffffffffffffff7, 0x8, 0x5, 0xb9f, 0x1, 0x8, 0x0, 0xffffffffffffffff}) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x500) ftruncate(r7, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:18:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xbf8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe38}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:51 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:18:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x4}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc00}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe3c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:51 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) mknod$loop(&(0x7f0000000000)='./bus\x00', 0x8, 0x0) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 666.512665][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 666.512689][ T27] audit: type=1804 audit(1577179131.377:4232): pid=6510 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/764/bus" dev="sda1" ino=16917 res=1 09:18:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc04}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe40}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc08}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 666.759744][ T27] audit: type=1804 audit(1577179131.627:4233): pid=6523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/764/bus" dev="sda1" ino=16917 res=1 09:18:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x3f000000}}], 0x1, 0x0) 09:18:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe44}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc10}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:52 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000000)=ANY=[@ANYRESDEC=r2], 0x1, 0x4) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:18:52 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r5, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r5], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r1) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) [ 667.385529][ T27] audit: type=1804 audit(1577179132.257:4234): pid=6541 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/765/bus" dev="sda1" ino=17201 res=1 [ 667.480732][ T27] audit: type=1804 audit(1577179132.307:4235): pid=6545 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/765/bus" dev="sda1" ino=17201 res=1 09:18:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x7}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe48}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc18}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:52 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="a8237d0bca5b375f1610337af1f1b80f473c7c96b5db915a48bc9697f05824871e6ea6229e67109dbb75"], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:18:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe4c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc20}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe50}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 667.812491][ T27] audit: type=1804 audit(1577179132.677:4236): pid=6568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/766/bus" dev="sda1" ino=17201 res=1 [ 667.924021][ T6572] __nla_validate_parse: 27 callbacks suppressed [ 667.924031][ T6572] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x40000000}}], 0x1, 0x0) 09:18:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc24}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:53 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="a154bfbb0d1d6818d930f3172c2ad3be52c8000000000000da7eb6d4ca27"], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x4c342, 0x0) r1 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x34d, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1, 0x420000) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000180)) syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000100)={0x6, 0x800, 0x5}) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1888, 0x400) 09:18:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe54}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:53 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r5, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r5], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r1) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) [ 668.301292][ T6580] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 668.390861][ T6586] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 668.401526][ T27] audit: type=1800 audit(1577179133.267:4237): pid=6587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17329 res=0 [ 668.443372][ T27] audit: type=1800 audit(1577179133.307:4238): pid=6587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17329 res=0 09:18:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x20c}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc28}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe58}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:53 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="040ac684a272740be054fa011d68bed32ee7f6c36dc68858e6f210b570be494c33f185d1531338587123a39cb5bdb0e2d62b578806ca2070737fe4e7759b6cbfcedd687e205ed98a6896af5e94a4d2811b60475147a07c5944e445aa5996cc021716e838abf93d9778fceb236879e113ff330afe775ac6f14aa16100"/133], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 668.572960][ T6599] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:18:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc2c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 668.675658][ T6607] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe5c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 668.739782][ T27] audit: type=1804 audit(1577179133.607:4239): pid=6609 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/768/bus" dev="sda1" ino=17377 res=1 09:18:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe60}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 668.876267][ T6614] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 668.901890][ T6615] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 669.052792][ T6619] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 09:18:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x40020000}}], 0x1, 0x0) 09:18:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc30}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:54 executing program 1: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x2, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:18:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe64}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:54 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r5, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r5], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r1) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) [ 669.419254][ T27] audit: type=1804 audit(1577179134.287:4240): pid=6630 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/769/bus" dev="sda1" ino=16926 res=1 09:18:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x240}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 669.512108][ T6637] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 669.528611][ T6632] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:18:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe68}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc34}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 669.636351][ T27] audit: type=1804 audit(1577179134.507:4241): pid=6646 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/769/bus" dev="sda1" ino=16926 res=1 09:18:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc38}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:54 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0a992a731483e65ffa6ddd925df6edb861b91068ac3d593f9f3e82"], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup2(0xffffffffffffffff, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) 09:18:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe6c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe70}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0xffffff7f}}], 0x1, 0x0) 09:18:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc3c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe74}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:55 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) flistxattr(r1, &(0x7f0000000000)=""/31, 0x1f) 09:18:55 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 09:18:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x300}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc40}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe78}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc44}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe7c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc48}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe80}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x40030000000000}}], 0x1, 0x0) 09:18:56 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x60000, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)=0x2) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0xd9) 09:18:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc4c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe84}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:56 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 09:18:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x700}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe88}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc50}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe8c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc54}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 671.902837][ T27] kauditd_printk_skb: 5 callbacks suppressed [ 671.902877][ T27] audit: type=1804 audit(1577179136.767:4247): pid=6734 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/772/bus" dev="sda1" ino=16958 res=1 09:18:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe90}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc58}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x100000000000000}}], 0x1, 0x0) 09:18:57 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write(r0, &(0x7f0000000100)="7a3b96ebe30d0115c1c18b7ecd59f988fd907f257a3c7e4367991c080052cc4e61e2e1be2c5f1c88cf66e794b6949c6acd07a84e0ea918e9f18ad74171c27daba32260dfd9657292cb4a3d51aadf6c43a44c92f50f14e871c0568e3b1e6366c80f95265c1b338d3bab54eb250e5f534d167cd893fd16ee8e26c45383b4c0a87f425c894742806fe72276448905befced19ce93e55d1ab5dcb8725af374c66a94b12d12a67cb8200601aecfca1e0b2d3a4c6bcd5a411ea2b5355ec7312f530ae8ec9ec3ea191cc8c05ab57fa19fe2952ce8ec7a8030c7999473a5c767afab86178df2b179e02c5846ee233fc867364b567e52190c28434eb0ed06450ffdede3", 0xff) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r1 = getpid() syz_open_procfs(r1, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=r1, 0x12) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x400, 0x0) 09:18:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc5c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe94}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:57 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 09:18:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0xc02}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 672.637267][ T27] audit: type=1804 audit(1577179137.507:4248): pid=6777 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/773/bus" dev="sda1" ino=16958 res=1 09:18:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc60}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe98}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc64}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xea0}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 672.991676][ T27] audit: type=1804 audit(1577179137.857:4249): pid=6781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/773/bus" dev="sda1" ino=16958 res=1 09:18:58 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, &(0x7f0000000100)="9d9b4a1a6d0329c6fc87fe15a79c35d6f95c3247effa6adc6bef4b63ab2455cb77f9636dccf9a0f075ba5ee4e3602f5d61d5dc163b2b1e5a52f9b5c8d1a8a92e2821228af51592b06c9d5fa7e0bbf775c9d34169e224831694173abf683ce00af80dc0593be48b4d5b2c7c4b30f43c362d0852af880fc793a3363f07575860c784567195182e727a0b0c6281393ad73f", &(0x7f00000001c0)=""/135}, 0x20) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f0000000280)={0x7, 'hsr0\x00', {0x1}, 0x5}) [ 673.171434][ T6798] __nla_validate_parse: 25 callbacks suppressed [ 673.171448][ T6798] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 673.235506][ T6799] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:18:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x25}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 673.357224][ T27] audit: type=1804 audit(1577179138.227:4250): pid=6802 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/774/bus" dev="sda1" ino=16963 res=1 [ 673.450272][ T6806] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x200000000000000}}], 0x1, 0x0) 09:18:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc68}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:58 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 09:18:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x35}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 673.626619][ T6815] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:18:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x3f00}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc6c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 673.818727][ T6826] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x5b}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 673.874558][ T27] audit: type=1800 audit(1577179138.737:4251): pid=6802 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16963 res=0 09:18:58 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) mount$bpf(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='bpf\x00', 0x20000, &(0x7f0000000100)={[{@mode={'mode', 0x3d, 0x65f}}, {@mode={'mode', 0x3d, 0x1000}}, {@mode={'mode', 0x3d, 0x91}}, {@mode={'mode', 0x3d, 0x9}}], [{@euid_lt={'euid<', 0xee00}}]}) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 673.962033][ T6833] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:18:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc70}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 674.019483][ T6836] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 674.125106][ T27] audit: type=1804 audit(1577179138.987:4252): pid=6840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/775/bus" dev="sda1" ino=16965 res=1 [ 674.194360][ T6842] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:18:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc74}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 674.292267][ T6845] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x2}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 674.409803][ T6848] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 674.473692][ T27] audit: type=1804 audit(1577179139.337:4253): pid=6850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/775/bus" dev="sda1" ino=16965 res=1 [ 674.600748][ T6852] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc78}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:18:59 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 09:18:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x300000000000000}}], 0x1, 0x0) 09:18:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x3}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 674.716719][ T6861] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:18:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x4000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:18:59 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000600)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000680)=""/84, 0x54}, {&(0x7f0000000700)=""/221, 0xdd}, {&(0x7f0000000800)=""/160, 0xa0}], 0x3, &(0x7f0000000900)=""/154, 0x9a}, 0x20) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) recvmsg$can_raw(r2, &(0x7f00000003c0)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/122, 0x7a}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f00000002c0)=""/143, 0x8f}], 0x3, &(0x7f0000000440)=""/216, 0xd8}, 0x40000060) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000540)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x5, 0x18, 0x1f, 0x9}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={r6, 0x200, 0x20}, &(0x7f0000000140)=0xc) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) r7 = getpid() syz_open_procfs(r7, 0x0) perf_event_open(&(0x7f0000000580)={0x4, 0x70, 0x80, 0x7f, 0x9, 0x1, 0x0, 0x200000100000001, 0x201c2, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x2, @perf_config_ext={0x9, 0xf43e}, 0x4280, 0x4, 0x8, 0x7, 0x3, 0x1ff, 0x5}, r7, 0x0, 0xffffffffffffffff, 0xcf18e92979f4a2b7) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 674.853614][ T6870] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:18:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc7c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 674.930679][ T27] audit: type=1804 audit(1577179139.797:4254): pid=6876 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/776/bus" dev="sda1" ino=17473 res=1 09:18:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x4}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 675.021694][ T6881] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc80}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x5}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 675.120891][ T6884] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:00 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x43) ftruncate(r0, 0x208200) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm_plock\x00', 0x100000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000800)={0x0, 0x7f, 0x5}, &(0x7f0000000840)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000880)={r4, 0x3f}, &(0x7f00000008c0)=0x8) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f00000004c0)={0x3ff, 0x14, 0x4, 0x50002040, 0x8, {0x0, 0x2710}, {0x3, 0xc, 0x8, 0x1, 0x5, 0x48, "7a280666"}, 0x3f, 0x0, @userptr=0x9, 0x72e8, 0x0, 0xffffffffffffffff}) mknodat(r5, &(0x7f0000000240)='./bus\x00', 0x8000, 0x7) r6 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) r7 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x24004048, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) connect$bt_sco(r6, &(0x7f0000000040)={0x1f, {0x6, 0x7f, 0x7, 0x1, 0x13, 0x80}}, 0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x82, &(0x7f0000000180)={r8}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r8, 0x3}, 0x8) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="000aa6c200489b385edf3a0b5bd1ede3dfb41b62873d5bbd0ae28ddc9a3efab437c5f3ab35c813fdce3c3db924e7272b5418619d83946268b716e1aab9623c1c25eea4c016d21f466b74e07aa71ff1e485ca2f49e2051dcaa72846756b619b12adab2311c8a314010000007d1b95d8ede16e1004afb75f6db40411d08bf16d593a25cf7600"/145], 0x13b, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='rose0\x00', 0x10) sendmmsg$inet(r10, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e24, @rand_addr=0x2}, 0x10, &(0x7f00000003c0)=[{&(0x7f00000001c0)="a929b92bcb350086417598669e44369c6a339fd7ef27296286ce1130efae4bc3945b5f63a678aa47c32adc3e843c24dfbe525f4da956df127f21e5c9d65c70cc3c99578208a455b7a83c6a3c741673096619ac87", 0x54}, {&(0x7f0000000240)}, {&(0x7f0000000280)="c90195bb951a00746387b67cc6bae7882b7b48abcdab4c3c3648831e54bd25afeaeff2a69080e83e0c24c2bc026f4041c2e5d4ddb0baf35206046b49ad22cd4042f46ba7e726fccf4032c5ebadc5a34926ba5dbb431d896ba8dc", 0x5a}, {&(0x7f0000000300)="79c549aac27fc4eebec15cd5696e6fd38243eb7d1461a81208e91db6c458af7f44665c1cfb4cea7eb4ebfc510243c128aca936a446c682109dce32dd7f6606ed8138e752c425aecb291cf4798d7eea6470cea222018339a44de04c85b97f529bc3796b25393a9a7ae1a50bbf45e6fdba8167614f9651baafb46dc5ef8477932abe4f7db774f8e78c1649377da2de831f42e14d24ea166266e7cbeda87730ac40", 0xa0}], 0x4, &(0x7f0000000440)=[@ip_tos_u8={{0x11}}], 0x18}}], 0x1, 0x40) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000100)) [ 675.281930][ T6891] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 675.314438][ T6892] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x6}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:00 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0x11}, 0x2, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x400, 0x31) [ 675.558557][ T6901] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:00 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) [ 675.604180][ T27] audit: type=1804 audit(1577179140.467:4255): pid=6902 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/778/bus" dev="sda1" ino=16964 res=1 [ 675.688821][ T6902] ima: Can not allocate sm3-256 (reason: -2) [ 675.695121][ T27] audit: type=1800 audit(1577179140.567:4256): pid=6902 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16964 res=0 09:19:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc84}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0xc02000000000000}}], 0x1, 0x0) 09:19:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x7}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x4002}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:00 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_DRAIN(r2, 0x4144, 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 675.819110][ T6917] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 675.909459][ T6918] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xa}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc88}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xc}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc94}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xe}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xc9c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xca0}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:01 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="848adb155608a495844ef8b2e4d0a73b1bfffb7e7541fcc4a3125d53fc4577a504a9b5712f494f61aa47a326397e7a1ac30421618bd4f1ac041d9af246c8513ec7f86e1fa6a5bfdf6bad41a01b43a56b4930a2116034c76c45881c17066ebd1d02513c9f8a82492e626e32729b5c81643a5d841c62a086c8b0557f13e1cde602b347f7a2fd88904076f8f4063eb2cdc85934675406a582d68af0dc"], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:19:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x3f00000000000000}}], 0x1, 0x0) 09:19:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x10}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:01 executing program 2: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=""/114, 0x72}) clone(0x28b84900, 0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000100)={0x8000, 0x44, 0x4d60a33e}) 09:19:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xdd4}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:01 executing program 1: creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x3}}}, 0x90) ftruncate(r0, 0x208200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r2, 0x100, 0x70bd26, 0x9, {}, [@TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'netpci0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x8804}, 0x10000004) setxattr$security_ima(&(0x7f0000000040)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000000)=@sha1={0x1, "a47501002c00"}, 0x15, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x0, 0x6}}}, 0x90) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4, 0x7}}, 0x10) 09:19:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0xff03}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:01 executing program 2: [ 676.930870][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 676.930892][ T27] audit: type=1804 audit(1577179141.797:4259): pid=6978 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/781/bus" dev="sda1" ino=16958 res=1 09:19:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xddc}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x48}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 677.099567][ T27] audit: type=1804 audit(1577179141.877:4260): pid=6988 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/781/bus" dev="sda1" ino=16958 res=1 09:19:02 executing program 2: 09:19:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mkdirat(r5, &(0x7f0000000100)='./bus\x00', 0x8ff4edf22b64cdf3) r6 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r6, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:19:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x4c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 677.362993][ T27] audit: type=1804 audit(1577179142.227:4261): pid=7000 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/782/bus" dev="sda1" ino=16938 res=1 09:19:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x4000000000000000}}], 0x1, 0x0) 09:19:02 executing program 2: 09:19:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe04}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x60}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:02 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:19:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x34000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 677.851519][ T27] audit: type=1804 audit(1577179142.717:4262): pid=7021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/783/bus" dev="sda1" ino=16801 res=1 09:19:02 executing program 2: 09:19:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x68}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe08}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:02 executing program 2: 09:19:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe0c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:03 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB='~='], 0x2, 0x2) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000), 0x48800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x204043, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000180)={0x3, 0xcad, 0x6, 0x1, 0x6}) r5 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r6, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f00000001c0)={0x0, 0x4, 0x0, 0x20}) [ 678.219783][ T7040] __nla_validate_parse: 8 callbacks suppressed [ 678.219794][ T7040] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 678.373176][ T27] audit: type=1804 audit(1577179143.237:4263): pid=7044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/784/bus" dev="sda1" ino=16641 res=1 [ 678.444779][ T27] audit: type=1804 audit(1577179143.307:4264): pid=7046 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/784/bus" dev="sda1" ino=16641 res=1 09:19:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x4002000000000000}}], 0x1, 0x0) 09:19:03 executing program 2: 09:19:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x6c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe10}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:03 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:19:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x40000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 678.816424][ T7064] validate_nla: 8 callbacks suppressed [ 678.816437][ T7064] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 678.831241][ T27] audit: type=1804 audit(1577179143.687:4265): pid=7066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/785/bus" dev="sda1" ino=16853 res=1 09:19:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed1", 0x13}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[]}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 678.873365][ T7065] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:03 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00'], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:19:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x74}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe14}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) rmdir(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x43) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) getpeername$netlink(r4, &(0x7f0000000180), &(0x7f0000000240)=0xc) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) sendmmsg(r6, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) [ 679.039895][ T27] audit: type=1804 audit(1577179143.907:4266): pid=7077 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/786/bus" dev="sda1" ino=16724 res=1 [ 679.071241][ T7081] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x7a}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 679.120582][ T7082] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 679.304795][ T7090] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:04 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40), &(0x7f00000000c0)=@ng={0x4, 0xa}, 0xfffffdf8, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:19:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe18}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x186}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0xffffff7f00000000}}], 0x1, 0x0) 09:19:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x400300}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 679.746561][ T7107] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 679.747365][ T27] audit: type=1804 audit(1577179144.617:4267): pid=7105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/787/bus" dev="sda1" ino=16524 res=1 [ 679.761119][ T7106] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe1c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x300}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 679.928844][ T7115] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 679.978768][ T7118] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x500}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe20}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000280)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000500200002801000000000000280100000000000028010000b8010000b8010000b8010000b80100000001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0002801000000000000000000000000000000000000010048006c696d697400000000000000000000000000000000000000000000000000000000e7ead440e0c5eed00000000000000000000000000000000000000000000000000000000000280074746c00000000000000000000000000000000000000000000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000010000000000000000000000736e6d700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009000000003000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000680200001001000010010000100100ff0000000000000000d0010000d0010000d0010000d0010000d001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800100100000000000000000000000000000000000000005800686173686c696d6974000000000000000000000000000000000000000001670000001080000000000010000000000000000000000200ff0f0000000000000000000000040000ff0f000000000000000000000000000048004354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000c00000000000000000000000000000000000000000003000616464727479706500000000000000000000000000000000000000000000000000000000000000000000000000002000545241434500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) [ 680.126293][ T7124] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:05 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0402"], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 680.169788][ T7125] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 680.200950][ T7127] x_tables: duplicate underflow at hook 3 09:19:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe24}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 680.216356][ T7127] x_tables: duplicate underflow at hook 3 [ 680.251490][ T7127] x_tables: duplicate underflow at hook 3 [ 680.273889][ T7130] x_tables: duplicate underflow at hook 3 [ 680.318641][ T27] audit: type=1804 audit(1577179145.187:4268): pid=7132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/788/bus" dev="sda1" ino=16594 res=1 09:19:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x600}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 680.376267][ T7135] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto$inet6(0xffffffffffffff9c, &(0x7f0000000040), 0xfffffffffffffdd6, 0x4, 0x0, 0x0) 09:19:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe34}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 680.531540][ T7143] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 680.599074][ T7146] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0xffffffff00000000}}], 0x1, 0x0) 09:19:05 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x2, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:19:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x1000000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x700}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe38}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:05 executing program 2: clone(0x28b84900, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) [ 680.829706][ T7162] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 680.839675][ T7163] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:05 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 09:19:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xa00}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe3c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 681.021544][ T7175] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 681.055367][ T7177] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xc00}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe40}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 681.262681][ T7184] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:06 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) ioctl$FICLONE(r3, 0x40049409, 0xffffffffffffffff) 09:19:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0xffffffffffffffff}}], 0x1, 0x0) 09:19:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe44}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xe00}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x2000000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:06 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:19:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x2000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x1000000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe48}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x4000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:06 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="240a9121bfcbce2d51ea0ded8636563440a597d66a6de771aaf8fff7d125f97db5f1e02b0a56e693438724943198ba929db4122836c9ebdd44062175071b84cb72df196f3b283c66a1fe905cc135e9b1455815ba0a6f056757abfc6836f9dcfb33d2ff0654df1328e778a1df"], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:19:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe4c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 682.143598][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 682.143621][ T27] audit: type=1804 audit(1577179147.007:4273): pid=7227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/792/bus" dev="sda1" ino=16987 res=1 09:19:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$netrom(r1, &(0x7f0000000000)={{0x3, @null}, [@null, @null, @null, @rose, @null, @null, @default, @rose]}, &(0x7f0000000100)=0x48) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) setxattr$security_ima(&(0x7f0000000140)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x2, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 682.384440][ T27] audit: type=1804 audit(1577179147.247:4274): pid=7235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/793/bus" dev="sda1" ino=16987 res=1 09:19:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe50}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x4800}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:07 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 09:19:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x1, 0x0) 09:19:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x3000000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 682.787354][ T27] audit: type=1804 audit(1577179147.657:4275): pid=7253 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/794/bus" dev="sda1" ino=16987 res=1 09:19:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x4c00}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x35}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x5865}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe54}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe58}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x6000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:08 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) [ 683.248416][ T7277] __nla_validate_parse: 6 callbacks suppressed [ 683.248428][ T7277] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x6558}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:08 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./bus\x00', 0x3, 0x4, &(0x7f0000000440)=[{&(0x7f0000000100), 0x0, 0x80000001}, {&(0x7f0000000140)="a66063b43161308421857ce66bf83e73eb0e0e10b2953e3c44eab4b3f1a435a1d6f8e4a6f42e031dc7ff517bbfb0c3b7755c64893ad8225e519ed014b7cadf687de4bf0548162d3064d69b2d18ea804f263ce49d798db71a7ae3363e513096bf54ed39bdb5400fa225446f2fb53b9d0e52eb6c8ff7803ba5b5239ef1e4a8a5dc5f8522f8c47ed9e72278d6b199632b0f74be99f6634781965bbb967642e1e50f7980251d1cdcc9188e52b45c28f489354ce59623065b8413ea4069486208741b4a51d8dbbb737293156023866ebd3346d6209fbdfbd4142eaecca620e7650d", 0xdf, 0x2}, {&(0x7f0000000240)="1b2cd2cbf008a3018ceded42854444807016ae8179d7ee6030a4246a1471d5af3a751e2360d982aa7f488ad603a38a9ab3aaacdc012c7dcebb175e152381de1452f61b9ec75c5a6e3a57fffa083b364f2d97b107c3985198330ada7c355aa8aca66eb700140c0692aa00d1030837056e2e1bfc073d630f3a3d1c0befcae150375f3b9d79ec670075995456aca0ec6779e681e1", 0x93}, {&(0x7f0000000300)="f2efe73ee116ef54b107491afd9ab9f3168d4c97ff8e6e13aced24b1bc75e3d2ac1e497927a9ee80e2bae9018f8208ae146311e68f8d68f82e11a66309e7eede521beac0766598f448839710b056435f777f23f7600243a11e3b127c03b842aa06bf79512177b509cfc4301387dbfbfdbd01a8d924fda724c08e3d830f7319812568ae8e6e6575d14130764c8e5462dab8093001f20ca55d333bf2356dfa86c00fcf7965b9df7b6ea216c0fd7da427e5da8ba0663db2551ad01d62d4e23b75570e7aa92b82e3bc5c6ffb3c47c1ccd5a2f5e6dd363a493dc7456aa087639072516134b7399835f34fa079eda85b4eae282b1900", 0xf3, 0x3}], 0x4, &(0x7f00000004c0)='ppp1*$\xc2^md5sumwlan1{trusted:em0em0\x00') ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0091"], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000001, 0x81cc0b3088cb91d4, r2, 0x10000000) sched_setscheduler(0xffffffffffffffff, 0x3, &(0x7f0000000100)=0x4) 09:19:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe5c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 683.598207][ T27] audit: type=1804 audit(1577179148.467:4276): pid=7289 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/795/bus" dev="sda1" ino=16787 res=1 [ 683.682137][ T7300] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x0, 0x2}}], 0x1, 0x0) 09:19:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x6800}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x7000000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe60}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 683.810120][ T27] audit: type=1804 audit(1577179148.677:4277): pid=7305 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/795/bus" dev="sda1" ino=16787 res=1 [ 683.845339][ T7309] validate_nla: 9 callbacks suppressed [ 683.845351][ T7309] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x6c00}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:08 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SETTRIGGER(r2, 0x40045010, &(0x7f0000000040)=0x9) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000000)=@md5={0x1, "ae40b699c9d267404b0c35223cafa39e"}, 0x11, 0x0) open(&(0x7f0000000180)='./bus/file0\x00', 0x10042, 0x16) [ 684.013201][ T7320] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 684.065991][ T7324] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:09 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2100, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0x1f}, 0x16, 0x2) 09:19:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe64}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x3000000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x7400}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 684.264859][ T7330] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 684.343503][ T7339] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 684.373046][ T7330] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 684.382521][ T27] audit: type=1804 audit(1577179149.247:4278): pid=7337 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/797/bus" dev="sda1" ino=16994 res=1 09:19:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x7a00}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe68}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 684.558996][ T7345] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 684.602355][ T7346] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 684.654425][ T27] audit: type=1804 audit(1577179149.517:4279): pid=7340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/797/bus" dev="sda1" ino=16994 res=1 09:19:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x0, 0x3}}], 0x1, 0x0) 09:19:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe6c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x8100}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0xc020000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 684.871219][ T7359] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 684.896001][ T7361] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x8601}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:09 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e21, 0x9f, @rand_addr="d1405bd8a6ee9dbdc5b1b185bea87921", 0x40}}}, 0x84) prctl$PR_CAPBSET_READ(0x17, 0x9) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="00000000001304958d7733aaf2c047f479e533c11eb6f5f6b83e0fb97f9c489dc2eac76e47db57196f740d415fb9c0c48867dd00c51f1714757fb5fbff3e90d8c66060d7320028cac4d72726d602a7282212197186947f17ccf18438625e37dfc46f88084be73368e7e37a55706145f17eb40841cf10a41c195041c41b0e62bffd197d8c8e95e723d2664b568c1b8bef78c8a58dc741eddced232c0bf571f95b374edea6a500f6015cd302fc15a36132f93ac7d87bdbaf15f7e80aacd0a75cd5b17e6758b2ced1072a7379dab80965c1b4970159e9ac88722245dbcaf41bc4252928c3d8ae0d11e4a718270e89076b8ccc"], 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = socket$isdn(0x22, 0x3, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000500)=0xc) sendmsg$sock(r1, &(0x7f0000000380)={&(0x7f0000000000)=@hci={0x1f, 0x9, 0x3}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)="f1f3b54be05f7f7ed116fe34298bc221d655b0867a30eb491b7c4a0d7e12c083e7879917d92db89a2e7e559ea9da8dcc86838957893e86ab5f81df406cdfa2a5c9aad7bd0060352fe6a32d934730680ea3631ebc71b379f45dbc7cec1a019172d69d02e3b310a95fe7eaff1a77d7ae5a93427e93cf368c1fd32f0f9c60ca4907a9fdba6c420bbc6899", 0x89}, {&(0x7f00000001c0)="38cf9d51c272337d2f31168bfce0820f1b4642f31a1237f796e6c6b6bf2d76fdf215c4fba4c61bac6f422c2fae802feee404539aafccf54b4b5dfa655856b428288c4f646e9578eb75ed232fcce585cc9e4e952e5b32053e6b3fcb9cdbbb3a830b91465b8fbcec5d134e993f4da240d7abc699985b8f630978ad8d1bc5f9449438fb03b47acbb9d2f93c8b7af233120c", 0xfffffffffffffd34}, {&(0x7f0000000280)="ba990c9ce463beb6b35e1a23f0611046c2293034d1f3de86a0fe6933699d51c79d12d637113ea038a824ff67acf71f882d42affeda2cb72399ce3cdeee67ec35347a9fcd84ec24331a517604b942e876bb963bb8705aa29e0ec01f021c0ec4c1e6b8996ac122ab9f5b961dbfd4918ee048e889f319af04da7a8861af88d501161c7d8c2c0e70d2108a5e6aff6de29b6bc1b7dc1178be7e19", 0x98}], 0x3, &(0x7f0000000440)=[@timestamping={{0x14, 0x1, 0x25, 0x1ff}}, @mark={{0x14, 0x1, 0x24, 0x10001}}, @txtime={{0x18, 0x1, 0x3d, 0x7f}}, @mark={{0x14, 0x1, 0x24, 0x8e0}}, @mark={{0x14, 0x1, 0x24, 0x401}}, @txtime={{0x328, 0x1, 0x3d, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x40}}, @mark={{0x14, 0x1, 0x24, 0xd74}}], 0xc0}, 0x40) [ 685.018355][ T7369] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe70}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 685.073000][ T27] audit: type=1804 audit(1577179149.937:4280): pid=7373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/798/bus" dev="sda1" ino=16994 res=1 09:19:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x1000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x3000000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 685.176872][ T27] audit: type=1804 audit(1577179149.987:4281): pid=7373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir670010486/syzkaller.qDY1ig/798/bus" dev="sda1" ino=16994 res=1 [ 685.211198][ T7378] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe74}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 685.294085][ T7381] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x2000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 685.444680][ T7386] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe78}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 685.524572][ T7390] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 685.647300][ T7393] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:19:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x0, 0x20c}}], 0x1, 0x0) 09:19:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x3000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe7c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x3f000000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 685.927159][ T7406] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe80}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x4000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 686.177855][ T7419] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe84}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x5000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x3000000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe88}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x591e9a4}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe8c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x0, 0x240}}], 0x1, 0x0) 09:19:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x6000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe90}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x40000000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x7000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe94}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xa000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x3f000000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe98}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xc000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xea0}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xe000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x0, 0x300}}], 0x1, 0x0) 09:19:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x25}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x40020000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x10000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x35}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x20000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0x300}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x5b}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x40000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x48000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x4c000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 688.937808][ T7521] validate_nla: 14 callbacks suppressed [ 688.937819][ T7521] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:19:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x0, 0xc02}}], 0x1, 0x0) 09:19:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0xff030000}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 689.056580][ T7528] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x2}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x60000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 689.187793][ T7537] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:19:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x3}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:14 executing program 2: r0 = msgget$private(0x0, 0x204) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000002c0)=""/106) fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) statx(r3, &(0x7f0000000040)='./bus\x00', 0x0, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) statx(0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x1000, 0x8, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) acct(&(0x7f00000003c0)='./bus\x00') msgctl$IPC_SET(r0, 0x1, &(0x7f0000000340)={{0x0, r1, r4, r5, r6, 0x41, 0x8}, 0x0, 0x0, 0x7fff, 0x2, 0xfffffffffffffff7, 0x8, 0x5, 0xb9f, 0x1, 0x8, 0x0, 0xffffffffffffffff}) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x500) ftruncate(r7, 0x208200) setxattr$security_ima(&(0x7f0000001d00)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0xa}, 0x13b, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 689.299337][ T7541] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 689.368506][ T7544] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:19:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x65580000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x4}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0xe20}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 689.549775][ T7549] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x68000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 689.649720][ T7553] __nla_validate_parse: 9 callbacks suppressed [ 689.649735][ T7553] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 689.686429][ T7554] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:19:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x5}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 689.792399][ T7557] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) [ 689.955093][ T7565] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 09:19:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x0, 0x3f00}}], 0x1, 0x0) 09:19:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x6c000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0xffffff7f}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x6}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 690.079397][ T7572] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 09:19:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x74000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x7}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x7a000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xa}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x81000000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xc}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xe}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x0, 0x4000}}], 0x1, 0x0) 09:19:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x86010000}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0xffffffff}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x10}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x88a8ffff}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x48}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x4c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x9effffff}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x60}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xa4e99105}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x68}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x0, 0x4002}}], 0x1, 0x0) 09:19:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x6c}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xc3ffffff}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xf0ffffff}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x74}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xfeffffff}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x7a}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xffffa888}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}, 0xffffffff}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x300}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xffffff7f}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000ccb000), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1, 0x0, 0x0, 0x34000}}], 0x1, 0x0) 09:19:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000080000000001739f486a0ef063f58e57c4f3c167d9d0070d52bafd9c4365dde7f3bbfe9e67ef98b9029fd336949c2aba9c74e66b880084c49dc9d0654d67f0094d26a9eacb2ae39233f04941f0de3a293ab889ac2e26dee3436872155c40c710cdaee6d1631c8a46f7f3616195c7312002048bf8f117b014e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d3cc4c07cda5c3e09f8f1adca6fcec858ce4d3a0f5ea4686b4b00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x2, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0) 09:19:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x500}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xffffff9e}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x600}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xffffffc3}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x700}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xfffffff0}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xa00}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:18 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = shmget(0x2, 0xd000, 0x800, &(0x7f0000ff3000/0xd000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getrlimit(0x6, &(0x7f0000000080)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) setxattr$security_ima(&(0x7f0000000540)='./bus\x00', &(0x7f0000001d40)='security.ima\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="040a99a5e963e331116ae63fc9d51263e9399a2c9153441a48ba5f2141ea3f656a308316c04d6c30b4ba675400db889bee9288b074815143f603280bf06f786d524b93e190521192bb500184bff34e3aacf108b18781a2e403e11395fc4aeed77c498fb219e8fbbca75d778815f9db65d437f8d14d1acd634d6222f986f7060c9907948de361d37f2d7a74770d1b5e4fc4ac13fb03f1ae65a5e25e3858e58b476e611dfa5497f9985b866dcd8869f50b2386447383e9b932"], 0x1, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x100) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmsg$kcm(r4, &(0x7f0000000440)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)=""/139, 0x8b}, {&(0x7f00000001c0)=""/207, 0xcf}, {&(0x7f00000002c0)=""/46, 0x2e}, {&(0x7f0000000300)=""/60, 0x3c}], 0x4, &(0x7f0000000380)=""/76, 0x4c}, 0x2) 09:19:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xfffffffe}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 09:19:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xc00}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) [ 694.101475][ T7733] validate_nla: 34 callbacks suppressed [ 694.101487][ T7733] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 694.223766][ T7741] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 694.268184][T10415] ================================================================== [ 694.276328][T10415] BUG: KCSAN: data-race in kcm_release / kcm_tx_work [ 694.283000][T10415] [ 694.285354][T10415] write to 0xffff88807ee856b8 of 8 bytes by task 7708 on cpu 0: [ 694.293518][T10415] kcm_release+0xb9/0x480 [ 694.298008][T10415] __sock_release+0x85/0x160 [ 694.302614][T10415] sock_close+0x24/0x30 [ 694.303060][ T27] audit: type=1804 audit(1577179159.167:4282): pid=7739 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir511908247/syzkaller.M81bcD/423/bus" dev="sda1" ino=17033 res=1 [ 694.306767][T10415] __fput+0x1e1/0x520 [ 694.306779][T10415] ____fput+0x1f/0x30 [ 694.306794][T10415] task_work_run+0xf6/0x130 [ 694.306815][T10415] exit_to_usermode_loop+0x2b4/0x2c0 [ 694.306833][T10415] do_syscall_64+0x384/0x3a0 [ 694.306865][T10415] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 694.359475][T10415] [ 694.361815][T10415] read to 0xffff88807ee856b8 of 8 bytes by task 10415 on cpu 1: [ 694.369455][T10415] kcm_tx_work+0x5e/0xe0 [ 694.373717][T10415] process_one_work+0x3d4/0x890 [ 694.378578][T10415] worker_thread+0xa0/0x800 [ 694.383085][T10415] kthread+0x1d4/0x200 [ 694.387163][T10415] ret_from_fork+0x1f/0x30 [ 694.391568][T10415] [ 694.393895][T10415] Reported by Kernel Concurrency Sanitizer on: [ 694.400057][T10415] CPU: 1 PID: 10415 Comm: kworker/u4:6 Not tainted 5.5.0-rc1-syzkaller #0 [ 694.408553][T10415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.418623][T10415] Workqueue: kkcmd kcm_tx_work [ 694.423393][T10415] ================================================================== [ 694.431470][T10415] Kernel panic - not syncing: panic_on_warn set ... [ 694.438071][T10415] CPU: 1 PID: 10415 Comm: kworker/u4:6 Not tainted 5.5.0-rc1-syzkaller #0 [ 694.446579][T10415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.456649][T10415] Workqueue: kkcmd kcm_tx_work [ 694.461418][T10415] Call Trace: [ 694.464723][T10415] dump_stack+0x11d/0x181 [ 694.469071][T10415] panic+0x210/0x640 [ 694.472983][T10415] ? vprintk_func+0x8d/0x140 [ 694.477590][T10415] kcsan_report.cold+0xc/0xd [ 694.482204][T10415] kcsan_setup_watchpoint+0x3fe/0x460 [ 694.487592][T10415] __tsan_read8+0xc6/0x100 [ 694.492021][T10415] kcm_tx_work+0x5e/0xe0 [ 694.496286][T10415] process_one_work+0x3d4/0x890 [ 694.501164][T10415] worker_thread+0xa0/0x800 [ 694.505694][T10415] kthread+0x1d4/0x200 [ 694.509779][T10415] ? rescuer_thread+0x6a0/0x6a0 [ 694.514641][T10415] ? kthread_unpark+0xe0/0xe0 [ 694.519334][T10415] ret_from_fork+0x1f/0x30 [ 694.525344][T10415] Kernel Offset: disabled [ 694.529673][T10415] Rebooting in 86400 seconds..