Warning: Permanently added '[localhost]:39330' (ECDSA) to the list of known hosts. [ 178.359454][ T42] audit: type=1400 audit(1594164330.168:42): avc: denied { map } for pid=9987 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16525 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2020/07/07 23:25:30 fuzzer started 2020/07/07 23:25:30 dialing manager at 10.0.2.10:42899 2020/07/07 23:25:30 syscalls: 3130 2020/07/07 23:25:30 code coverage: enabled 2020/07/07 23:25:30 comparison tracing: enabled 2020/07/07 23:25:30 extra coverage: enabled 2020/07/07 23:25:30 setuid sandbox: enabled 2020/07/07 23:25:30 namespace sandbox: enabled 2020/07/07 23:25:30 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/07 23:25:30 fault injection: enabled 2020/07/07 23:25:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/07 23:25:30 net packet injection: enabled 2020/07/07 23:25:30 net device setup: enabled 2020/07/07 23:25:30 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/07 23:25:30 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/07 23:25:30 USB emulation: enabled [ 179.104386][ T42] audit: type=1400 audit(1594164330.908:43): avc: denied { integrity } for pid=10006 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 23:26:22 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) [ 231.331269][ T42] audit: type=1400 audit(1594164383.128:44): avc: denied { map } for pid=10009 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=81 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 23:26:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000380)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r4, 0x0, 0xf, 0x0) 23:26:23 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 232.084180][T10012] IPVS: ftp: loaded support on port[0] = 21 [ 232.084777][T10010] IPVS: ftp: loaded support on port[0] = 21 23:26:23 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1fb842, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) [ 232.393590][T10015] IPVS: ftp: loaded support on port[0] = 21 [ 232.443722][T10016] IPVS: ftp: loaded support on port[0] = 21 [ 232.693221][T10012] chnl_net:caif_netlink_parms(): no params data found [ 232.875262][T10010] chnl_net:caif_netlink_parms(): no params data found [ 233.020565][T10012] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.041459][T10012] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.072315][T10012] device bridge_slave_0 entered promiscuous mode [ 233.143219][T10012] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.171230][T10012] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.207910][T10012] device bridge_slave_1 entered promiscuous mode [ 233.243357][T10016] chnl_net:caif_netlink_parms(): no params data found [ 233.317255][T10015] chnl_net:caif_netlink_parms(): no params data found [ 233.375965][T10012] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 233.424881][T10012] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 233.488736][T10010] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.504615][T10010] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.521182][T10010] device bridge_slave_0 entered promiscuous mode [ 233.604374][T10012] team0: Port device team_slave_0 added [ 233.631373][T10010] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.659952][T10010] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.697190][T10010] device bridge_slave_1 entered promiscuous mode [ 233.748948][T10012] team0: Port device team_slave_1 added [ 233.791392][T10016] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.822434][T10016] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.839570][T10016] device bridge_slave_0 entered promiscuous mode [ 233.860285][T10016] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.879743][T10016] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.905239][T10016] device bridge_slave_1 entered promiscuous mode [ 233.945676][T10010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.007560][T10012] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 234.030326][T10012] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 234.137873][T10012] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 234.196038][T10010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.247017][T10015] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.276745][T10015] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.308500][T10015] device bridge_slave_0 entered promiscuous mode [ 234.337746][T10012] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 234.385800][T10012] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 234.543003][T10012] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 234.641206][T10016] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.684559][T10015] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.718508][T10015] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.741787][T10015] device bridge_slave_1 entered promiscuous mode [ 234.781218][T10010] team0: Port device team_slave_0 added [ 234.798159][T10016] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.850437][T10015] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.880263][T10010] team0: Port device team_slave_1 added [ 234.985727][T10012] device hsr_slave_0 entered promiscuous mode [ 235.043923][T10012] device hsr_slave_1 entered promiscuous mode [ 235.149655][T10015] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.210206][T10016] team0: Port device team_slave_0 added [ 235.246824][T10010] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 235.264803][T10010] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.334713][T10010] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 235.378596][T10015] team0: Port device team_slave_0 added [ 235.394442][T10016] team0: Port device team_slave_1 added [ 235.425760][T10010] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 235.444815][T10010] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.550314][T10010] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 235.591805][T10015] team0: Port device team_slave_1 added [ 235.638042][T10016] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 235.665215][T10016] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.820633][T10016] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 235.904401][T10016] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 235.950287][T10016] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.090798][T10016] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 236.171654][T10015] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 236.212419][T10015] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.371470][T10015] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 236.478534][T10015] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 236.521830][T10015] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.663063][T10015] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 236.804554][T10010] device hsr_slave_0 entered promiscuous mode [ 236.862649][T10010] device hsr_slave_1 entered promiscuous mode [ 236.943469][T10010] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 236.999395][T10010] Cannot create hsr debugfs directory [ 237.127746][T10016] device hsr_slave_0 entered promiscuous mode [ 237.212572][T10016] device hsr_slave_1 entered promiscuous mode [ 237.272308][T10016] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 237.296206][T10016] Cannot create hsr debugfs directory [ 237.414707][T10015] device hsr_slave_0 entered promiscuous mode [ 237.472527][T10015] device hsr_slave_1 entered promiscuous mode [ 237.542563][T10015] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 237.571096][T10015] Cannot create hsr debugfs directory [ 237.917486][ T42] audit: type=1400 audit(1594164389.718:45): avc: denied { create } for pid=10012 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 237.933407][T10012] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 238.033618][ T42] audit: type=1400 audit(1594164389.728:46): avc: denied { write } for pid=10012 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 238.165007][ T42] audit: type=1400 audit(1594164389.728:47): avc: denied { read } for pid=10012 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 238.202835][T10012] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 238.324659][T10012] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 238.429129][T10010] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 238.507189][T10012] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 238.631594][T10010] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 238.740016][T10010] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 238.856384][T10016] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 238.965311][T10010] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 239.078402][T10016] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 239.195784][T10016] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 239.299463][T10016] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 239.380072][T10015] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 239.495176][T10015] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 239.636627][T10015] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 239.767517][T10015] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 240.009181][T10012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.072843][T10031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.094618][T10031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.125007][T10012] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.146002][T10016] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.169765][T10010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.231515][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.253275][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.279535][ T18] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.293619][ T18] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.336789][T10016] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.357672][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.373167][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.388841][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.407187][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.422794][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.461395][T10037] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.488357][T10037] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.515262][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.530403][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.550771][T10015] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.588781][T10010] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.614632][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.644225][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.671359][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.701028][ T3824] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.720806][ T3824] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.756537][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.785217][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.802672][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.818326][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.856664][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.898402][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.940761][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.975559][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.004029][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.025352][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.057282][T10015] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.103497][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 241.133219][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.160270][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.201771][ T28] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.227926][ T28] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.256714][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.290207][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.325836][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.362771][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.394046][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.416250][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.442554][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.471290][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.498814][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.522729][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.538839][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.553168][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.569186][ T28] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.588758][ T28] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.609845][ T1215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.637276][ T1215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.676598][ T1215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.734326][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.775661][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.825576][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.880590][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.933711][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.984620][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 242.036693][T10016] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 242.088242][T10016] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 242.168519][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.205557][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.231292][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.261703][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.303293][ T3824] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.338631][ T3824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.376369][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.428799][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.473222][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.518970][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.547272][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.571716][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.591465][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 242.607079][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 242.628431][T10012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 242.671534][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.699770][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.719501][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.739218][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.754078][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 242.788886][T10016] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 242.835050][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 242.857263][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 242.872827][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.885695][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.899278][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.916986][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.938136][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.958650][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.980588][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.998833][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 243.031579][T10010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 243.065798][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 243.080446][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.094696][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 243.110768][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 243.137515][ T1215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.155726][ T1215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.178083][ T1215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 243.196616][ T1215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.229023][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 243.267935][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 243.311394][T10012] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 243.353607][T10010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 243.391374][T10016] device veth0_vlan entered promiscuous mode [ 243.416181][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.436375][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.459408][ T1215] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.478156][ T1215] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.502660][T10016] device veth1_vlan entered promiscuous mode [ 243.531089][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 243.548751][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 243.566825][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.585062][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.606656][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 243.629439][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 243.645919][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.667542][ T3824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.705958][T10015] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 243.764796][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.783836][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.804131][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.820095][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.854731][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.883683][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.903192][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.926761][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.974194][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 244.004547][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 244.025212][T10012] device veth0_vlan entered promiscuous mode [ 244.050807][T10010] device veth0_vlan entered promiscuous mode [ 244.075013][T10010] device veth1_vlan entered promiscuous mode [ 244.088341][T10016] device veth0_macvtap entered promiscuous mode [ 244.111401][T10012] device veth1_vlan entered promiscuous mode [ 244.130154][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 244.145120][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 244.160451][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 244.178468][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 244.195136][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 244.218742][T10016] device veth1_macvtap entered promiscuous mode [ 244.254435][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 244.266931][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.279532][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.290758][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.305655][T10015] device veth0_vlan entered promiscuous mode [ 244.338061][T10016] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 244.353095][T10015] device veth1_vlan entered promiscuous mode [ 244.363234][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 244.375527][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 244.388699][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 244.406505][T10016] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 244.421210][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 244.436187][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 244.449602][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 244.462724][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 244.488655][T10010] device veth0_macvtap entered promiscuous mode [ 244.513122][T10010] device veth1_macvtap entered promiscuous mode [ 244.524850][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 244.537352][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 244.554349][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 244.569965][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 244.584072][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 244.602974][T10012] device veth0_macvtap entered promiscuous mode [ 244.626744][T10010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 244.645641][T10010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.668493][T10010] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 244.691311][T10012] device veth1_macvtap entered promiscuous mode [ 244.705814][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 244.718816][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 244.732788][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 244.746149][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 244.761686][T10010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.777031][T10010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.801694][T10010] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 244.914692][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 244.934296][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 245.098093][T10012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 245.116400][T10012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.131493][T10012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 245.146921][T10012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.163240][T10012] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 245.293819][ T42] audit: type=1400 audit(1594164397.098:48): avc: denied { associate } for pid=10016 comm="syz-executor.3" name="syz3" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 245.461037][T10015] device veth0_macvtap entered promiscuous mode [ 245.478578][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 245.492939][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 245.507059][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 245.520554][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 245.532346][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 245.553914][T10012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 245.569145][T10012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.584647][T10012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 245.599388][T10012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.615598][T10012] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 245.631019][T10016] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 245.716118][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 245.771371][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 245.820403][T10015] device veth1_macvtap entered promiscuous mode 23:26:37 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 245.947004][T10015] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 245.977206][T10015] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.998738][T10015] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 246.020357][T10015] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 246.045860][T10015] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 246.066994][T10015] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 246.095808][T10015] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 246.174514][ T1215] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 246.208950][ T1215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 246.233375][T10015] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 246.256333][T10015] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 246.274052][T10015] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 246.292515][T10015] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 246.306714][T10015] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 246.325444][T10015] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 246.345699][T10015] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 246.424161][ T1215] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 246.471719][ T1215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:26:38 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:38 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:38 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:39 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:39 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:39 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:39 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000380)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r4, 0x0, 0xf, 0x0) 23:26:41 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:41 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 23:26:41 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:41 executing program 1: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 249.977942][ T42] audit: type=1804 audit(1594164401.698:49): pid=10113 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir243573216/syzkaller.laJB8q/2/bus" dev="sda1" ino=16572 res=1 23:26:42 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r1, 0x0, 0xf, 0x0) 23:26:42 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 23:26:42 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:42 executing program 1: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 251.084840][T10130] 9pnet: Insufficient options for proto=fd 23:26:42 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:43 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 251.217389][T10143] 9pnet: Insufficient options for proto=fd 23:26:43 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) [ 251.330269][T10149] 9pnet: Insufficient options for proto=fd 23:26:43 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:43 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:43 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32, @ANYBLOB="08000a00e4ba665ad0f649d9d0cb9259729a352911d12fb5060b2e962377ad05ad05a51de1d661075df4003d238228200ebb4ee7e4115289dd372d6292f7c4b93ca7a86f087beab2f15b98ae9c3cfd03ccbb"], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:43 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r1, 0x0, 0xf, 0x0) 23:26:43 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8000fffffffe) 23:26:43 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:43 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 252.007778][T10164] device ip6tnl1 entered promiscuous mode 23:26:43 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8000fffffffe) 23:26:44 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8000fffffffe) [ 252.521020][T10193] device ip6tnl1 entered promiscuous mode 23:26:44 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r1, 0x0, 0xf, 0x0) 23:26:44 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:44 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:26:45 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:26:45 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32, @ANYBLOB="08000a00e4ba665ad0f649d9d0cb9259729a352911d12fb5060b2e962377ad05ad05a51de1d661075df4003d238228200ebb4ee7e4115289dd372d6292f7c4b93ca7a86f087beab2f15b98ae9c3cfd03ccbb"], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:45 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 253.487404][T10213] device ip6tnl1 entered promiscuous mode 23:26:45 executing program 2: open$dir(0x0, 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:45 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000400)='./bus\x00', 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:26:45 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:45 executing program 2: open$dir(0x0, 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:45 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32, @ANYBLOB="08000a00e4ba665ad0f649d9d0cb9259729a352911d12fb5060b2e962377ad05ad05a51de1d661075df4003d238228200ebb4ee7e4115289dd372d6292f7c4b93ca7a86f087beab2f15b98ae9c3cfd03ccbb"], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:45 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000400)='./bus\x00', 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 254.084367][T10237] device ip6tnl1 entered promiscuous mode 23:26:46 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:46 executing program 2: open$dir(0x0, 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:46 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000400)='./bus\x00', 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:26:46 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:46 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:46 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:46 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:46 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32, @ANYBLOB="08000a00e4ba665ad0f649d9d0cb9259729a352911d12fb5060b2e962377ad05ad05a51de1d661075df4003d238228200ebb4ee7e4115289dd372d6292f7c4b93ca7a86f087beab2f15b98ae9c3cfd03ccbb"], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:46 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') ftruncate(0xffffffffffffffff, 0x208200) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:26:46 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:46 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) [ 254.903575][T10269] device ip6tnl1 entered promiscuous mode 23:26:46 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:46 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:47 executing program 0: pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xf, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:26:47 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') ftruncate(0xffffffffffffffff, 0x208200) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 255.232558][T10285] 9pnet: Insufficient options for proto=fd 23:26:47 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:47 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') ftruncate(0xffffffffffffffff, 0x208200) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:26:47 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32, @ANYBLOB="08000a00e4ba665ad0f649d9d0cb9259729a352911d12fb5060b2e962377ad05ad05a51de1d661075df4003d238228200ebb4ee7e4115289dd372d6292f7c4b93ca7a86f087beab2f15b98ae9c3cfd03ccbb"], 0x90}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000), 0xb, 0x0) [ 255.519692][T10299] 9pnet: Insufficient options for proto=fd 23:26:47 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32, @ANYBLOB="08000a00e4ba665ad0f649d9d0cb9259729a352911d12fb5060b2e962377ad05ad05a51de1d661075df4003d238228200ebb4ee7e4115289dd372d6292f7c4b93ca7a86f087beab2f15b98ae9c3cfd03ccbb"], 0x90}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000), 0xb, 0x0) 23:26:47 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:47 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 255.663399][T10313] 9pnet: Insufficient options for proto=fd 23:26:47 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:47 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32, @ANYBLOB="08000a00e4ba665ad0f649d9d0cb9259729a352911d12fb5060b2e962377ad05ad05a51de1d661075df4003d238228200ebb4ee7e4115289dd372d6292f7c4b93ca7a86f087beab2f15b98ae9c3cfd03ccbb"], 0x90}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000), 0xb, 0x0) 23:26:47 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:47 executing program 0: pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xf, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:26:47 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:47 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:48 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:48 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:48 executing program 0: pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xf, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:26:48 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:48 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:48 executing program 3: chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:48 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 256.993301][ T42] audit: type=1804 audit(1594164408.808:50): pid=10350 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/23/bus" dev="sda1" ino=16599 res=1 23:26:48 executing program 1: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:48 executing program 1: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:49 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:49 executing program 3: chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:49 executing program 0: pipe(0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xf, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:26:49 executing program 1: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:49 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:49 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:49 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140), 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) [ 257.858356][ T42] audit: type=1804 audit(1594164409.668:51): pid=10378 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/24/bus" dev="sda1" ino=16602 res=1 23:26:49 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:49 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:50 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140), 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) 23:26:50 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:50 executing program 0: pipe(0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xf, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:26:50 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140), 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) 23:26:50 executing program 3: chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:50 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:50 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:50 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 258.717531][ T42] audit: type=1804 audit(1594164410.528:52): pid=10406 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/25/bus" dev="sda1" ino=16604 res=1 23:26:50 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 258.800971][T10418] 9pnet: Insufficient options for proto=fd [ 258.825987][T10421] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 258.854804][T10421] device ip6tnl1 entered promiscuous mode 23:26:51 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100"], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:51 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:51 executing program 0: pipe(0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xf, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:26:51 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 259.560106][T10436] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 259.561053][T10432] 9pnet: Insufficient options for proto=fd 23:26:51 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100"], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:51 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 259.653901][ T42] audit: type=1804 audit(1594164411.468:53): pid=10438 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/26/bus/bus" dev="sda1" ino=16619 res=1 [ 259.802756][T10441] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 259.820451][T10442] 9pnet: Insufficient options for proto=fd 23:26:51 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100"], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:51 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 259.889453][T10449] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 259.921136][T10451] 9pnet: Insufficient options for proto=fd 23:26:51 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:51 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 259.963189][T10454] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. [ 260.037427][T10459] 9pnet: Insufficient options for proto=fd 23:26:52 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:52 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:52 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 23:26:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 260.374674][T10465] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:26:52 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 260.378267][T10467] 9pnet: Insufficient options for proto=fd 23:26:52 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 23:26:52 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) [ 260.459376][T10475] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:26:52 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 260.488297][ T42] audit: type=1804 audit(1594164412.298:54): pid=10476 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/27/bus/bus" dev="sda1" ino=16605 res=1 23:26:52 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) [ 260.551636][T10482] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:26:52 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:52 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) [ 260.664417][T10491] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:26:52 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:52 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 23:26:52 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 260.855631][T10504] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:26:52 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe80", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:52 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:52 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe80", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:52 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 23:26:52 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe80", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 260.979416][ T42] audit: type=1804 audit(1594164412.788:55): pid=10507 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/28/bus/bus" dev="sda1" ino=16615 res=1 23:26:53 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:53 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa08000820010000000800140020", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:53 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:53 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa08000820010000000800140020", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:53 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:53 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa08000820010000000800140020", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 261.442776][ T42] audit: type=1804 audit(1594164413.258:56): pid=10539 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/29/bus" dev="sda1" ino=16634 res=1 23:26:53 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff020000000000", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:53 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:53 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:53 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r3, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 23:26:53 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff020000000000", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:53 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff020000000000", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:53 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xf, 0x0) write$eventfd(r0, &(0x7f0000000040), 0x8) [ 261.772994][T10565] ptrace attach of "/syz-executor.2"[10015] was attempted by "/syz-executor.2"[10565] 23:26:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 261.807578][T10570] ptrace attach of "/syz-executor.2"[10015] was attempted by "/syz-executor.2"[10570] 23:26:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xe8, &(0x7f00000001c0)="c4fe910c6786cec96ddb5322addee07bee6333b5cacd891969b71832cb470c94d61f3514dca7712c225da4a455f4c9fd98a568097aa4acd6ecd74d473ff2bdb9693122311ae02ee3d3f8fbe0a10fff4bbaef7cd058ec3a54a90a11c890a73cef2d28533220798a410180000000000000c6fa36cea17bd8d700000000000000003f2623193c8ff31a4502a85559ca5fbc21ae2b0927eced002f21edcfdeff5287fd5ac653e58e6cc655d73dd1a3b31bdba0c944352bfe681abbfe7319ea6d2329590d78116396e8faa066cff2c0b03005fe637e68328e878c1a749846fafa32ff53163efcd47645f9"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:26:53 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff0200"/102, @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 261.888965][ T42] audit: type=1804 audit(1594164413.698:57): pid=10567 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/30/bus" dev="sda1" ino=16642 res=1 23:26:53 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:53 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff0200"/102, @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 262.076436][ T42] audit: type=1804 audit(1594164413.888:58): pid=10597 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/31/bus" dev="sda1" ino=16634 res=1 23:26:54 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff0200"/102, @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:54 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:54 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:54 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xf, 0x0) write$eventfd(r0, &(0x7f0000000040), 0x8) [ 263.755349][ T0] NOHZ: local_softirq_pending 08 23:26:56 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:56 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:56 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xf, 0x0) write$eventfd(r0, &(0x7f0000000040), 0x8) 23:26:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xe8, &(0x7f00000001c0)="c4fe910c6786cec96ddb5322addee07bee6333b5cacd891969b71832cb470c94d61f3514dca7712c225da4a455f4c9fd98a568097aa4acd6ecd74d473ff2bdb9693122311ae02ee3d3f8fbe0a10fff4bbaef7cd058ec3a54a90a11c890a73cef2d28533220798a410180000000000000c6fa36cea17bd8d700000000000000003f2623193c8ff31a4502a85559ca5fbc21ae2b0927eced002f21edcfdeff5287fd5ac653e58e6cc655d73dd1a3b31bdba0c944352bfe681abbfe7319ea6d2329590d78116396e8faa066cff2c0b03005fe637e68328e878c1a749846fafa32ff53163efcd47645f9"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 264.955768][T10622] __nla_validate_parse: 28 callbacks suppressed 23:26:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xe8, &(0x7f00000001c0)="c4fe910c6786cec96ddb5322addee07bee6333b5cacd891969b71832cb470c94d61f3514dca7712c225da4a455f4c9fd98a568097aa4acd6ecd74d473ff2bdb9693122311ae02ee3d3f8fbe0a10fff4bbaef7cd058ec3a54a90a11c890a73cef2d28533220798a410180000000000000c6fa36cea17bd8d700000000000000003f2623193c8ff31a4502a85559ca5fbc21ae2b0927eced002f21edcfdeff5287fd5ac653e58e6cc655d73dd1a3b31bdba0c944352bfe681abbfe7319ea6d2329590d78116396e8faa066cff2c0b03005fe637e68328e878c1a749846fafa32ff53163efcd47645f9"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 264.955849][T10622] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 264.991008][T10622] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 23:26:56 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff020000000000000000000000000001080001", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 265.066680][T10636] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 23:26:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xe8, &(0x7f00000001c0)="c4fe910c6786cec96ddb5322addee07bee6333b5cacd891969b71832cb470c94d61f3514dca7712c225da4a455f4c9fd98a568097aa4acd6ecd74d473ff2bdb9693122311ae02ee3d3f8fbe0a10fff4bbaef7cd058ec3a54a90a11c890a73cef2d28533220798a410180000000000000c6fa36cea17bd8d700000000000000003f2623193c8ff31a4502a85559ca5fbc21ae2b0927eced002f21edcfdeff5287fd5ac653e58e6cc655d73dd1a3b31bdba0c944352bfe681abbfe7319ea6d2329590d78116396e8faa066cff2c0b03005fe637e68328e878c1a749846fafa32ff53163efcd47645f9"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:26:56 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff020000000000000000000000000001080001", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 265.135783][T10645] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 23:26:57 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x50, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x24, &(0x7f0000000140)="000000000000003f7be92977f274014b2a089dba8c080f73ccd7468122157cab0b02d468"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:26:57 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff020000000000000000000000000001080001", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:57 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:57 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:57 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc0045401, 0x0) [ 265.804249][T10663] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 23:26:57 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc0045401, 0x0) 23:26:57 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:57 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc0045401, 0x0) 23:26:57 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:57 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc0045401, 0x0) 23:26:58 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:58 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:58 executing program 2: ioctl$KDGKBLED(0xffffffffffffffff, 0xc0045401, 0x0) 23:26:58 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:58 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:58 executing program 2: ioctl$KDGKBLED(0xffffffffffffffff, 0xc0045401, 0x0) 23:26:58 executing program 2: ioctl$KDGKBLED(0xffffffffffffffff, 0xc0045401, 0x0) 23:26:58 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:59 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xf, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:26:59 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:59 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc0045401, 0x0) 23:26:59 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:26:59 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc0045401, 0x0) 23:26:59 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:59 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:26:59 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc0045401, 0x0) 23:27:00 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:27:00 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:27:00 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0xc0045401, 0x0) 23:27:00 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:00 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0xc0045401, 0x0) 23:27:00 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff0000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 268.424051][T10758] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:27:00 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0xc0045401, 0x0) 23:27:00 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff0000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 268.718468][T10764] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:27:00 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:27:00 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) 23:27:00 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff0000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:27:00 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 269.198398][T10775] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:27:01 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff00000000200000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:27:01 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) [ 269.305758][T10781] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:27:01 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff00000000200000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:27:01 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) [ 269.415724][T10791] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:27:01 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff00000000200000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:27:01 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 23:27:01 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:01 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) [ 270.181827][T10800] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:27:02 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff00000000200000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:27:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCPKT(r0, 0x5420, 0x0) [ 270.299886][T10810] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:27:02 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff00000000200000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:27:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) ioctl$TIOCPKT(r0, 0x5420, 0x0) [ 270.449151][T10820] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:27:02 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff00000000200000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 270.515567][T10826] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:27:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$TIOCPKT(r0, 0x5420, 0x0) 23:27:02 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff0000000020000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:27:02 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r1, 0x0, 0xf, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:27:02 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) [ 271.041364][T10835] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:27:03 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff0000000020000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 271.280398][T10846] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:27:03 executing program 2: ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 23:27:03 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff0000000020000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:27:03 executing program 2: ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 23:27:03 executing program 2: ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 271.490336][T10855] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 23:27:03 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r1, 0x0, 0xf, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:27:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) 23:27:03 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:27:03 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=a']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 271.974517][T10870] tmpfs: Bad value for 'huge' 23:27:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) 23:27:03 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:27:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) [ 272.040594][ T42] audit: type=1804 audit(1594164423.848:59): pid=10870 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/41/bus/bus" dev="sda1" ino=16630 res=1 23:27:03 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 23:27:04 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r1, 0x0, 0xf, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:27:04 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:27:04 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=a']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:04 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 272.814019][T10900] tmpfs: Bad value for 'huge' 23:27:04 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 23:27:04 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 272.875532][ T42] audit: type=1804 audit(1594164424.688:60): pid=10900 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/42/bus/bus" dev="sda1" ino=16700 res=1 23:27:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:04 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 23:27:05 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, 0x0, 0x0) 23:27:05 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=a']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:05 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) [ 273.659060][T10932] tmpfs: Bad value for 'huge' 23:27:05 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) socket(0x10, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000), 0xb, 0x0) 23:27:05 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) socket(0x10, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000), 0xb, 0x0) [ 273.751160][ T42] audit: type=1804 audit(1594164425.558:61): pid=10942 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/43/bus/bus" dev="sda1" ino=16718 res=1 23:27:05 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) socket(0x10, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000), 0xb, 0x0) [ 274.636559][ T0] NOHZ: local_softirq_pending 08 23:27:07 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 23:27:07 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=alwa']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:07 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, 0x0, 0x0) 23:27:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:07 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) [ 276.031225][T10956] tmpfs: Bad value for 'huge' 23:27:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:07 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) [ 276.126629][ T42] audit: type=1804 audit(1594164427.928:62): pid=10968 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/44/bus/bus" dev="sda1" ino=16722 res=1 23:27:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e636787", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x30) 23:27:08 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=alwa']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 276.501171][T10991] tmpfs: Bad value for 'huge' [ 276.519211][ T42] audit: type=1804 audit(1594164428.328:63): pid=10991 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/45/bus/bus" dev="sda1" ino=16728 res=1 23:27:08 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0xf, 0x0) write$eventfd(r1, 0x0, 0x0) 23:27:08 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=alwa']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:08 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0xfffffffe) [ 276.855632][T10998] tmpfs: Bad value for 'huge' 23:27:08 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0xfffffffe) [ 276.937931][ T42] audit: type=1804 audit(1594164428.748:64): pid=10998 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/46/bus/bus" dev="sda1" ino=16712 res=1 23:27:08 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=alway']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 277.042403][T11015] tmpfs: Bad value for 'huge' [ 277.123872][ T42] audit: type=1804 audit(1594164428.938:65): pid=11015 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/47/bus/bus" dev="sda1" ino=16723 res=1 23:27:11 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0xfffffffe) 23:27:11 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=alway']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 23:27:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ptrace$cont(0x7, r0, 0x0, 0x0) [ 279.268193][T11031] tmpfs: Bad value for 'huge' 23:27:11 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0xfffffffe) 23:27:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) [ 279.377837][ T42] audit: type=1804 audit(1594164431.188:66): pid=11033 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/48/bus/bus" dev="sda1" ino=16730 res=1 23:27:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 23:27:11 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) ioctl$TIOCMIWAIT(r0, 0x545c, 0xfffffffe) 23:27:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 23:27:11 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=alway']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:11 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0xfffffffe) [ 279.647776][T11051] tmpfs: Bad value for 'huge' [ 279.711662][ T42] audit: type=1804 audit(1594164431.518:67): pid=11051 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir921177955/syzkaller.MHT6g1/49/bus/bus" dev="sda1" ino=16733 res=1 23:27:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:14 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) ioctl$TIOCMIWAIT(r0, 0x545c, 0xfffffffe) 23:27:14 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(0x0) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:14 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0xfffffffe) 23:27:14 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(0x0) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:14 executing program 1: ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0xfffffffe) 23:27:14 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(0x0) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 284.247309][ T0] NOHZ: local_softirq_pending 08 23:27:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:17 executing program 1: ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0xfffffffe) 23:27:17 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(0x0, 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:17 executing program 1: ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0xfffffffe) 23:27:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:17 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(0x0, 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:17 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0xfffffffe) 23:27:17 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(0x0, 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:17 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0xfffffffe) 23:27:17 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0xfffffffe) 23:27:20 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:27:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:20 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0xfffffffe) 23:27:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:20 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0xfffffffe) 23:27:20 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:27:20 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0xfffffffe) 23:27:20 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:27:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x103}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:20 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:23 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:23 executing program 1: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:27:23 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:23 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:23 executing program 1: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:27:23 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:26 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:26 executing program 1: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:27:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:26 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:26 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$inet(0x10, 0x3, 0xc) splice(r0, 0x0, r4, 0x0, 0x4ffe6, 0x0) 23:27:26 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 294.702340][ T42] audit: type=1400 audit(1594164446.508:68): avc: denied { create } for pid=11237 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 294.707327][T11244] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. [ 294.763220][ T42] audit: type=1400 audit(1594164446.518:69): avc: denied { write } for pid=11237 comm="syz-executor.1" path="socket:[45185]" dev="sockfs" ino=45185 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 23:27:26 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:27 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:27:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000100)=""/165, 0xa5) 23:27:29 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:27:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:29 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000000c0)) 23:27:29 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:27:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:29 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:29 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000000c0)) 23:27:29 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:32 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000000c0)) 23:27:32 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 23:27:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e636787", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:32 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000000c0)) 23:27:32 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) dup(r1) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000fffffffe) 23:27:32 executing program 1: ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000000c0)) 23:27:32 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) dup(r1) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000fffffffe) 23:27:32 executing program 1: ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000000c0)) 23:27:32 executing program 1: ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000000c0)) 23:27:35 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) dup(r1) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000fffffffe) 23:27:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:35 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000000c0)) 23:27:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:35 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000000c0)) 23:27:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:35 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000000c0)) 23:27:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x4, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:35 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 23:27:35 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000000c0)) 23:27:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:36 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 23:27:36 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000000c0)) 23:27:36 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 23:27:38 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000000c0)) 23:27:38 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) 23:27:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e636787", 0xfb}], 0x4, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:39 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 23:27:39 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) 23:27:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:39 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 23:27:39 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) 23:27:39 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 23:27:39 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="a1028100ff"], 0x1) r0 = socket(0x2, 0x2, 0x0) r1 = socket(0x2, 0x2, 0x0) dup2(r0, r1) connect$unix(r1, &(0x7f0000000000)=ANY=[], 0x10) write(r0, 0x0, 0x0) 23:27:42 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd60e21b0900083700feffffff000000000000000000000001ff"], 0x0) 23:27:42 executing program 1: syz_emit_ethernet(0x5a, &(0x7f0000000040)={@broadcast, @local, @val, {@ipv4}}, 0x0) 23:27:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:42 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd6008000900083700feffbfff00547ea8995c5d69ca100000000000000001"], 0x0) 23:27:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800082001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32, @ANYBLOB="08000a00e4ba665ad0f649d9d0cb9259729a352911d12fb5060b2e962377ad05ad05a51de1d661075df4003d238228200ebb4ee7e4115289dd372d6292f7c4b93ca7a86f087beab2f15b98ae9c3cfd03ccbb", @ANYRES32], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) syz_open_dev$vcsn(0x0, 0x0, 0x101202) 23:27:42 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) [ 310.411759][ T42] audit: type=1400 audit(1594164462.218:70): avc: denied { open } for pid=11454 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 23:27:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x23) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 310.478043][ T42] audit: type=1400 audit(1594164462.238:71): avc: denied { perfmon } for pid=11454 comm="syz-executor.1" capability=38 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 310.545453][ T42] audit: type=1400 audit(1594164462.238:72): avc: denied { kernel } for pid=11454 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 23:27:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x23) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 310.617537][ T42] audit: type=1400 audit(1594164462.238:73): avc: denied { confidentiality } for pid=11454 comm="syz-executor.1" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 23:27:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x23) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 23:27:42 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd60e21b09000837001500000001000b000000000000000001ff"], 0x0) 23:27:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:42 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd60e21b0900083700feffffff001f47e49264c7ee4f10520000000000000000000001"], 0x0) 23:27:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e636787", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x23) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 313.691246][T11513] ptrace attach of "/syz-executor.0"[11512] was attempted by "/syz-executor.0"[11513] 23:27:45 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) [ 313.815364][T11521] ptrace attach of "/syz-executor.0"[11520] was attempted by "/syz-executor.0"[11521] 23:27:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e636787", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x23) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 23:27:45 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x23) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 23:27:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:45 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 1: mknod(&(0x7f0000000100)='./bus\x00', 0x3a0914c44f7b802c, 0xd02) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x5, 0x0) write(r0, &(0x7f0000000080)='g', 0x1) 23:27:45 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:45 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaa3f42c22d165c86dd60a0e68700142900fe02000000c2b5ba0000000000008000fe8043c59871f92903729e832f778342"], 0x0) 23:27:45 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:46 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:46 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:46 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaa3f42c22d165c86dd60a0e68700142900fe02000000c2b5ba0000000000008000fe8043c59871f92903729e832f778342"], 0x0) 23:27:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:46 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x20) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000004, 0x0, 0x0, 0x5, 0x1, [{0x0, 0x7fffffff}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x8010) socket(0x11, 0x0, 0x0) sendfile(r1, r3, &(0x7f00000000c0)=0x8, 0x0) 23:27:46 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:46 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 314.382233][T11597] ptrace attach of "/syz-executor.2"[11594] was attempted by "/syz-executor.2"[11597] 23:27:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e636787", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:46 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x20) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000004, 0x0, 0x0, 0x5, 0x1, [{0x0, 0x7fffffff}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x8010) socket(0x11, 0x0, 0x0) sendfile(r1, r3, &(0x7f00000000c0)=0x8, 0x0) 23:27:46 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e636787", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:46 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x20) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000004, 0x0, 0x0, 0x5, 0x1, [{0x0, 0x7fffffff}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x8010) socket(0x11, 0x0, 0x0) sendfile(r1, r3, &(0x7f00000000c0)=0x8, 0x0) 23:27:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x20) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000004, 0x0, 0x0, 0x5, 0x1, [{0x0, 0x7fffffff}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x8010) socket(0x11, 0x0, 0x0) sendfile(r1, r3, &(0x7f00000000c0)=0x8, 0x0) 23:27:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x20) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000004, 0x0, 0x0, 0x5, 0x1, [{0x0, 0x7fffffff}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x8010) socket(0x11, 0x0, 0x0) 23:27:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x20) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000004, 0x0, 0x0, 0x5, 0x1, [{0x0, 0x7fffffff}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x8010) 23:27:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x20) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000004, 0x0, 0x0, 0x5, 0x1, [{0x0, 0x7fffffff}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 23:27:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x20) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000004, 0x0, 0x0, 0x5, 0x1, [{0x0, 0x7fffffff}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:27:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x20) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000004, 0x0, 0x0, 0x5, 0x1, [{0x0, 0x7fffffff}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 23:27:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x20) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000004, 0x0, 0x0, 0x5, 0x1, [{0x0, 0x7fffffff}]}) 23:27:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x20) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) 23:27:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x20) 23:27:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:27:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) [ 325.204717][ T0] NOHZ: local_softirq_pending 08 23:27:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {0x6}]}) 23:27:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:27:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:27:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f", 0x83}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 23:27:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f", 0x83}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:27:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 23:28:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:01 executing program 1: getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f", 0x83}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:01 executing program 1: getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 23:28:01 executing program 1: getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:01 executing program 1: r0 = socket$inet6(0xa, 0x0, 0xff) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) 23:28:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) 23:28:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3d", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:04 executing program 1: r0 = socket$inet6(0xa, 0x0, 0xff) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x0, 0x0}) 23:28:04 executing program 1: r0 = socket$inet6(0xa, 0x0, 0xff) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}]}) 23:28:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) [ 336.074171][ T0] NOHZ: local_softirq_pending 08 23:28:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3d", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}]}) 23:28:08 executing program 1: socket$inet6(0xa, 0x3, 0xff) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:08 executing program 1: socket$inet6(0xa, 0x3, 0xff) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}]}) 23:28:08 executing program 1: socket$inet6(0xa, 0x3, 0xff) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3d", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {}]}) 23:28:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) 23:28:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {}]}) 23:28:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) getsockopt$inet6_buf(r0, 0x29, 0x45, 0x0, &(0x7f0000000240)) 23:28:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf", 0xe5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {}, {}]}) 23:28:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) getsockopt$inet6_buf(r0, 0x29, 0x45, 0x0, 0x0) 23:28:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588e", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) getsockopt$inet6_buf(r0, 0x29, 0x45, 0x0, 0x0) 23:28:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) getsockopt$inet6_buf(r0, 0x29, 0x45, 0x0, 0x0) 23:28:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {0x6}]}) 23:28:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000100)=""/39, &(0x7f0000000240)=0x27) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x20) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000004, 0x0, 0x0, 0x5, 0x1, [{0x0, 0x7fffffff}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x8010) socket(0x11, 0x0, 0x0) sendfile(r1, r3, &(0x7f00000000c0)=0x8, 0x0) 23:28:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {0x6}]}) 23:28:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf", 0xe5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000440)=ANY=[@ANYBLOB='S'], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000002c0017fc2ce8326b45a56e0000000000", @ANYRES32=r2, @ANYBLOB="0000ffff00000000f5ff00000a00010062617369630000000c0002000800010004"], 0x3c}}, 0x0) 23:28:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588e", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002e0, 0xe, 0x0, &(0x7f0000000080)="b95b03b708060000000000400045", 0x0, 0x7ff, 0x543, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:28:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588e", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 345.289687][ T42] audit: type=1400 audit(1594164497.098:74): avc: denied { prog_load } for pid=11978 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 345.771037][ T42] audit: type=1400 audit(1594164497.508:75): avc: denied { bpf } for pid=11978 comm="syz-executor.1" capability=39 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 23:28:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {0x6}]}) [ 346.192986][ T42] audit: type=1400 audit(1594164497.998:76): avc: denied { prog_run } for pid=11978 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 23:28:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd", 0xbd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd", 0xbd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd", 0xbd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002e0, 0xe, 0x0, &(0x7f0000000080)="b95b03b708060000000000400045", 0x0, 0x7ff, 0x543, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:28:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {0x6}]}) 23:28:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf", 0xe5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12", 0xf5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {0x6}]}) 23:28:20 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[@ANYRES16=r2, @ANYRES64=r1, @ANYBLOB="96fc969fdb4ac1053929b3fb7ffa7935422740ce5fd6b44a6ca992879a443f763e0d47461e29f0ba52", @ANYRESHEX=r1, @ANYRESHEX], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="0000000000ff20000000000000000000", 0x10) syz_genetlink_get_family_id$netlbl_cipso(0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x810}, 0x8000) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r1, 0x0, r4, 0x0, 0x4000000000000a12, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8040}, 0x20040014) sendmsg$RDMA_NLDEV_CMD_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x80) 23:28:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x2}, {}, {0x6}]}) 23:28:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x3, &(0x7f0000000040)=[{}, {}, {0x6}]}) 23:28:23 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[@ANYRES16=r2, @ANYRES64=r1, @ANYBLOB="96fc969fdb4ac1053929b3fb7ffa7935422740ce5fd6b44a6ca992879a443f763e0d47461e29f0ba52", @ANYRESHEX=r1, @ANYRESHEX], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="0000000000ff20000000000000000000", 0x10) syz_genetlink_get_family_id$netlbl_cipso(0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x810}, 0x8000) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r1, 0x0, r4, 0x0, 0x4000000000000a12, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8040}, 0x20040014) sendmsg$RDMA_NLDEV_CMD_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x80) 23:28:23 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x100) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12", 0xf5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82d", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:23 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x100) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12", 0xf5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:23 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x100) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:23 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x100) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:24 executing program 3: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:24 executing program 1: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1402c902, 0x0, 0x0, 0x0, 0x0) 23:28:24 executing program 3: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) [ 352.623506][ T42] audit: type=1400 audit(1594164504.428:77): avc: denied { sys_admin } for pid=12061 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 23:28:26 executing program 3: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82d", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:26 executing program 1: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1402c902, 0x0, 0x0, 0x0, 0x0) 23:28:26 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x100) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82d", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:26 executing program 1: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1402c902, 0x0, 0x0, 0x0, 0x0) 23:28:26 executing program 1: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1402c902, 0x0, 0x0, 0x0, 0x0) 23:28:26 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x100) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:26 executing program 1: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) clone(0x1402c902, 0x0, 0x0, 0x0, 0x0) 23:28:26 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x100) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:26 executing program 1: unshare(0x20000) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') clone(0x1402c902, 0x0, 0x0, 0x0, 0x0) 23:28:29 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:29 executing program 1: unshare(0x20000) clone(0x1402c902, 0x0, 0x0, 0x0, 0x0) 23:28:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b", 0xec}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b", 0xec}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:31 executing program 1: clone(0x1402c902, 0x0, 0x0, 0x0, 0x0) 23:28:31 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) 23:28:31 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b", 0xec}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:31 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) 23:28:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e", 0xf4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:31 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) 23:28:34 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:34 executing program 1: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1402c902, 0x0, 0x0, 0x0, 0x0) 23:28:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:34 executing program 1: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1402c902, 0x0, 0x0, 0x0, 0x0) 23:28:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:34 executing program 3: socket$inet6(0xa, 0x80003, 0x100) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e", 0xf4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:34 executing program 1: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1402c902, 0x0, 0x0, 0x0, 0x0) 23:28:34 executing program 3: socket$inet6(0xa, 0x80003, 0x100) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e", 0xf4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x103}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:35 executing program 3: socket$inet6(0xa, 0x80003, 0x100) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:28:35 executing program 1: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:28:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x103}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:35 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x100) sendmsg$inet6(r0, 0x0, 0x0) 23:28:35 executing program 1: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 23:28:35 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x100) sendmsg$inet6(r0, 0x0, 0x0) [ 366.158092][ T0] NOHZ: local_softirq_pending 08 23:28:38 executing program 1: unshare(0x20000) setns(0xffffffffffffffff, 0x0) 23:28:38 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x100) sendmsg$inet6(r0, 0x0, 0x0) 23:28:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:38 executing program 1: unshare(0x20000) setns(0xffffffffffffffff, 0x0) 23:28:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x103}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:38 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x100) sendmsg$inet6(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 23:28:38 executing program 1: unshare(0x20000) setns(0xffffffffffffffff, 0x0) 23:28:38 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x100) sendmsg$inet6(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 23:28:38 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x100) sendmsg$inet6(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 23:28:38 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) [ 366.796817][ T0] NOHZ: local_softirq_pending 08 23:28:41 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 23:28:41 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:28:41 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x104}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:41 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 23:28:41 executing program 1: unshare(0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 23:28:41 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x104}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:41 executing program 1: unshare(0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) [ 369.465026][T12284] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 23:28:41 executing program 1: unshare(0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) [ 369.737927][T12284] device ipvlan2 entered promiscuous mode 23:28:41 executing program 1: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, 0x0) setns(r0, 0x0) 23:28:41 executing program 1: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, 0x0) setns(r0, 0x0) 23:28:44 executing program 1: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, 0x0) setns(r0, 0x0) 23:28:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:44 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:28:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:44 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x104}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:44 executing program 1: unshare(0x20000) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(0xffffffffffffffff, 0x0) [ 372.566377][T12310] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 23:28:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:44 executing program 1: unshare(0x20000) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(0xffffffffffffffff, 0x0) 23:28:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 372.623979][T12310] device ipvlan2 entered promiscuous mode 23:28:44 executing program 1: unshare(0x20000) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(0xffffffffffffffff, 0x0) 23:28:44 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:28:44 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 373.209249][T12347] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 373.257995][T12347] device ipvlan2 entered promiscuous mode 23:28:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:47 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:28:47 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r1, r0) 23:28:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@empty, @ipv4={[0x0, 0x0, 0x8], [], @multicast1}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24c20082, r4}) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) [ 375.630403][T12363] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 23:28:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 375.658830][T12363] device ipvlan2 entered promiscuous mode 23:28:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e636787", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@empty, @ipv4={[0x0, 0x0, 0x8], [], @multicast1}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24c20082, r4}) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 23:28:47 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) [ 376.209782][T12400] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 376.241600][T12400] device ipvlan2 entered promiscuous mode [ 377.034377][ T0] NOHZ: local_softirq_pending 08 23:28:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:50 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) 23:28:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@empty, @ipv4={[0x0, 0x0, 0x8], [], @multicast1}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24c20082, r4}) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 23:28:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 378.723975][T12406] Dead loop on virtual device ip6_vti0, fix it urgently! 23:28:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 378.769150][T12418] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 378.790615][T12418] device ipvlan3 entered promiscuous mode 23:28:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@empty, @ipv4={[0x0, 0x0, 0x8], [], @multicast1}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24c20082, r4}) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) [ 378.881151][T12426] Dead loop on virtual device ip6_vti0, fix it urgently! 23:28:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:53 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140), 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='wg0\x00') ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 23:28:53 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) 23:28:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:53 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r0, 0x0, 0x141242, 0x0) memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syncfs(r0) 23:28:53 executing program 1: epoll_create1(0x0) socket$unix(0x1, 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000240)) write(r1, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000080)={0x1b8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 381.853362][T12451] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 381.913763][T12451] device ipvlan4 entered promiscuous mode 23:28:54 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 382.433335][T12462] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 382.477585][T12462] device ipvlan5 entered promiscuous mode 23:28:54 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 23:28:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:56 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:28:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 23:28:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) [ 384.866042][T12473] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 384.937685][T12473] device ipvlan6 entered promiscuous mode 23:28:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 23:28:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 23:28:56 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:28:59 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:28:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:59 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 387.855885][T12507] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 23:28:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:59 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:28:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) [ 387.949463][T12507] device ipvlan7 entered promiscuous mode 23:28:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:28:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 23:29:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:00 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x48}}, 0x0) 23:29:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 23:29:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 23:29:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 23:29:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 388.470707][T12561] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 388.497381][T12561] device ipvlan8 entered promiscuous mode 23:29:00 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x48}}, 0x0) 23:29:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 23:29:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 23:29:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 389.038230][T12593] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 389.090483][T12593] device ipvlan9 entered promiscuous mode 23:29:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 23:29:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:01 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x48}}, 0x0) 23:29:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) [ 389.619811][T12611] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 389.703990][T12611] device ipvlan10 entered promiscuous mode 23:29:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 23:29:03 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x48}}, 0x0) 23:29:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 23:29:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e636787", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, 0x0, 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 23:29:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e636787", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, 0x0, 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 23:29:04 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x48}}, 0x0) 23:29:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, 0x0, 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 23:29:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 23:29:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 23:29:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 23:29:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 23:29:05 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x48}}, 0x0) 23:29:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 23:29:07 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 395.700824][T12685] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 395.727847][T12685] device ipvlan11 entered promiscuous mode 23:29:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 23:29:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 23:29:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 23:29:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 23:29:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e636787", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:10 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 23:29:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 398.716683][T12710] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 399.389085][T12710] device ipvlan11 entered promiscuous mode 23:29:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 23:29:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:11 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 400.183512][T12743] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 400.194134][T12738] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 400.201108][T12742] IPVS: stopping backup sync thread 12743 ... [ 400.550267][T12738] device ipvlan11 entered promiscuous mode [ 400.744624][T12745] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 400.760010][T12746] IPVS: stopping backup sync thread 12745 ... 23:29:12 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 401.064711][T12750] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 23:29:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 401.122800][T12750] device ipvlan11 entered promiscuous mode [ 401.237864][T12754] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 401.241446][T12753] IPVS: stopping backup sync thread 12754 ... 23:29:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 23:29:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 401.550761][T12757] IPVS: stopping backup sync thread 12759 ... [ 401.562558][T12759] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 401.616709][T12761] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 401.654375][T12761] device ipvlan11 entered promiscuous mode 23:29:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 23:29:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 402.788379][T12765] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 402.988934][T12765] device ipvlan11 entered promiscuous mode [ 403.063946][T12776] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 23:29:14 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200046263, 0x80000002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff33) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 403.166821][T12779] NFS: Device name not specified 23:29:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:15 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200046263, 0x80000002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff33) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 403.276408][T12785] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 403.359492][T12785] device ipvlan11 entered promiscuous mode [ 403.369965][T12788] NFS: Device name not specified 23:29:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 403.656214][T12793] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 403.688331][T12793] device ipvlan12 entered promiscuous mode 23:29:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 404.069975][T12799] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 404.226158][T12799] device ipvlan13 entered promiscuous mode 23:29:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) [ 406.027127][T12808] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 406.061016][T12808] device ipvlan14 entered promiscuous mode 23:29:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 406.236334][T12822] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 406.296103][T12822] device ipvlan15 entered promiscuous mode 23:29:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 406.487903][T12830] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 406.532635][T12830] device ipvlan16 entered promiscuous mode 23:29:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) [ 409.096786][T12838] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 409.201139][T12838] device ipvlan17 entered promiscuous mode 23:29:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 409.530993][T12847] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 409.597012][T12847] device ipvlan18 entered promiscuous mode 23:29:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 409.750824][T12853] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 409.818275][T12853] device ipvlan19 entered promiscuous mode 23:29:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 409.963880][T12857] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 410.045713][T12857] device ipvlan20 entered promiscuous mode 23:29:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 412.147668][T12864] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 412.178086][T12864] device ipvlan21 entered promiscuous mode 23:29:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 412.385285][T12877] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 23:29:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 412.440568][T12877] device ipvlan22 entered promiscuous mode 23:29:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) [ 412.550641][T12886] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 412.613867][T12886] device ipvlan23 entered promiscuous mode 23:29:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 415.416406][T12898] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 415.473537][T12898] device ipvlan24 entered promiscuous mode 23:29:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 415.557999][T12907] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 23:29:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 415.584179][T12907] device ipvlan25 entered promiscuous mode 23:29:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 415.654977][T12919] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 416.306180][T12919] device ipvlan26 entered promiscuous mode 23:29:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 418.689061][T12925] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 418.996351][T12925] device ipvlan27 entered promiscuous mode 23:29:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 419.390600][T12946] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 23:29:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) [ 419.445045][T12946] device ipvlan28 entered promiscuous mode 23:29:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) [ 419.611749][T12964] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 419.636339][T12964] device ipvlan29 entered promiscuous mode 23:29:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) 23:29:34 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e6367877de32f42fb425ff6da76", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 422.367549][T12978] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 23:29:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 422.855101][T12978] device ipvlan30 entered promiscuous mode 23:29:34 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) [ 423.194112][T12995] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 423.292665][T12995] device ipvlan31 entered promiscuous mode 23:29:35 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 423.430309][T13004] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 423.470601][T13004] device ipvlan32 entered promiscuous mode 23:29:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 423.606085][T13010] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 423.665994][T13010] device ipvlan33 entered promiscuous mode 23:29:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 425.381543][T13019] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 425.484465][T13019] device ipvlan34 entered promiscuous mode 23:29:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 23:29:37 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x48}}, 0x0) 23:29:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:37 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x48}}, 0x0) 23:29:37 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x48}}, 0x0) 23:29:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) [ 427.599175][ T0] NOHZ: local_softirq_pending 08 23:29:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 23:29:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 23:29:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 23:29:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 23:29:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c931e4d552420199d2b9b9ef6904ebac446a1c32fcbbcbfa3535c07a415e9aa2982f7d10064debf5bb6e8a1882828f61b226b61e2ffd566ddc78032c3dc0b80e44f35be719a2285c31c85bb31b008816269659b82df290d6ff5a519a44cf0f20afa6c28a5b514a925847d6f57e12ccad2e636787", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 23:29:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 23:29:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 23:29:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 23:29:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 23:29:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 23:29:43 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 23:29:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 23:29:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 23:29:44 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 23:29:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 23:29:44 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 23:29:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 23:29:44 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 23:29:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 23:29:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 23:29:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@val={0x2}, @void, @eth={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @multicast2}}}}}}, 0x2e) 23:29:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="665307031dc518cd3a5dffcfe60b582f59155f771fa36f9c931ef50b39563a72e490103bda248676f6f04d944002ddab6c92d42cc438bf16b7e955b0fc786aa3e306b3a62ab31f1633f49a5cd7fb6cb9be063619ded983a32672fd26f8401ee2e4f731ca7b80710e093f8df63b371bee9b47ef15bab884b1ed17b7de588ee33275f97f912d7679c9", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 23:29:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 435.373389][T13142] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 435.448838][ C0] traps: PANIC: double fault, error_code: 0x0 [ 435.448838][ C0] double fault: 0000 [#1] PREEMPT SMP KASAN [ 435.448838][ C0] CPU: 0 PID: 13141 Comm: syz-executor.2 Not tainted 5.8.0-rc2-syzkaller #0 [ 435.448838][ C0] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 435.448838][ C0] RIP: 0010:fixup_bad_iret+0x24/0x170 [ 435.448838][ C0] Code: eb cb 0f 1f 40 00 41 55 49 bd 00 00 00 00 00 fc ff df 41 54 55 48 89 fd 48 c7 c7 80 85 45 88 53 48 81 ec 40 01 00 00 48 89 e3 <48> c7 04 24 b3 8a b5 41 48 c7 44 24 08 cf 25 6b 89 48 c1 eb 03 48 [ 435.448838][ C0] RSP: 0018:fffffe0000001fb8 EFLAGS: 00010086 [ 435.448838][ C0] RAX: ffffffffffffffea RBX: fffffe0000001fb8 RCX: ffffffff88000e87 [ 435.448838][ C0] RDX: 0000000000000000 RSI: ffffffff880009a8 RDI: ffffffff88458580 [ 435.448838][ C0] RBP: fffffe0000002120 R08: 0000000000000000 R09: 0000000000000000 [ 435.448838][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 435.448838][ C0] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 435.448838][ C0] FS: 00007fdfc22bb700(0000) GS:ffff88802ce00000(0000) knlGS:0000000000000000 [ 435.448838][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 435.448838][ C0] CR2: fffffe0000001fa8 CR3: 000000005f04d000 CR4: 0000000000340ef0 [ 435.448838][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 435.448838][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 435.448838][ C0] Call Trace: [ 435.448838][ C0] [ 435.448838][ C0] error_entry+0xb8/0xc0 [ 435.448838][ C0] RIP: 0010:native_irq_return_iret+0x0/0x2 [ 435.448838][ C0] Code: 5a 41 59 41 58 58 59 5a 5e 5f 48 83 c4 08 e9 10 00 00 00 90 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 f6 44 24 20 04 75 02 <48> cf 57 0f 01 f8 0f 1f 00 65 48 8b 3c 25 00 90 01 00 48 89 07 48 [ 435.448838][ C0] RSP: 0018:fffffe00000021d8 EFLAGS: 00010046 ORIG_RAX: 0000000000000000 [ 435.448838][ C0] RAX: ffffffffffffffea RBX: 0000000000000000 RCX: 0000000000000000 [ 435.448838][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 435.448838][ C0] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 435.448838][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 435.448838][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 435.448838][ C0] ? asm_exc_general_protection+0x8/0x30 [ 435.448838][ C0] RIP: 0033:0xcd18c51d03075366 [ 435.448838][ C0] Code: Bad RIP value. [ 435.448838][ C0] RSP: 002b:00007fdfc22bac78 EFLAGS: 00000246 [ 435.448838][ C0] Modules linked in: [ 435.931997][ C0] ---[ end trace 178a3133aa4a3f4a ]--- [ 435.931997][ C0] RIP: 0010:fixup_bad_iret+0x24/0x170 [ 435.931997][ C0] Code: eb cb 0f 1f 40 00 41 55 49 bd 00 00 00 00 00 fc ff df 41 54 55 48 89 fd 48 c7 c7 80 85 45 88 53 48 81 ec 40 01 00 00 48 89 e3 <48> c7 04 24 b3 8a b5 41 48 c7 44 24 08 cf 25 6b 89 48 c1 eb 03 48 [ 435.931997][ C0] RSP: 0018:fffffe0000001fb8 EFLAGS: 00010086 [ 435.931997][ C0] RAX: ffffffffffffffea RBX: fffffe0000001fb8 RCX: ffffffff88000e87 [ 435.931997][ C0] RDX: 0000000000000000 RSI: ffffffff880009a8 RDI: ffffffff88458580 [ 435.931997][ C0] RBP: fffffe0000002120 R08: 0000000000000000 R09: 0000000000000000 [ 435.931997][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 435.931997][ C0] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 435.931997][ C0] FS: 00007fdfc22bb700(0000) GS:ffff88802ce00000(0000) knlGS:0000000000000000 [ 435.931997][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 435.931997][ C0] CR2: fffffe0000001fa8 CR3: 000000005f04d000 CR4: 0000000000340ef0 [ 435.931997][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 435.931997][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 435.931997][ C0] Kernel panic - not syncing: Fatal exception in interrupt [ 435.931997][ C0] Kernel Offset: disabled