71.660057][T11400] ext4_buffered_write_iter+0x44d/0x5d0 [ 271.665655][T11400] ext4_file_write_iter+0x88d/0x1930 [ 271.670961][T11400] ? lock_acquire+0x160/0x720 [ 271.675652][T11400] ? lock_is_held_type+0x87/0xe0 [ 271.681562][T11400] ? iov_iter_init+0x83/0x160 [ 271.686251][T11400] vfs_write+0xa08/0xc70 [ 271.690524][T11400] ksys_write+0x11b/0x220 [ 271.694863][T11400] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 271.700938][T11400] do_syscall_64+0x73/0xe0 [ 271.705357][T11400] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 271.710401][T11402] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 271.711244][T11400] RIP: 0033:0x45c369 [ 271.711257][T11400] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:07:36 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:07:36 executing program 0 (fault-call:0 fault-nth:5): mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) [ 271.711264][T11400] RSP: 002b:00007f487a0a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 271.711275][T11400] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 271.711282][T11400] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 271.711290][T11400] RBP: 00007f487a0a0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 271.711297][T11400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 271.711304][T11400] R13: 00007ffc2382efcf R14: 00007f487a0a19c0 R15: 000000000078bf0c 13:07:36 executing program 2 (fault-call:4 fault-nth:4): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:07:36 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r1, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) [ 271.822502][T11402] 8021q: adding VLAN 0 to HW filter on device bond24 [ 271.889352][T11448] FAULT_INJECTION: forcing a failure. [ 271.889352][T11448] name failslab, interval 1, probability 0, space 0, times 0 [ 271.909705][T11448] CPU: 1 PID: 11448 Comm: syz-executor.0 Not tainted 5.8.0-rc7-syzkaller #0 [ 271.918402][T11448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.928489][T11448] Call Trace: [ 271.931794][T11448] dump_stack+0x1f0/0x31e [ 271.936138][T11448] should_fail+0x38a/0x4e0 [ 271.940571][T11448] ? security_inode_alloc+0x32/0x1e0 [ 271.945865][T11448] should_failslab+0x5/0x20 [ 271.950379][T11448] kmem_cache_alloc+0x53/0x2d0 [ 271.955178][T11448] security_inode_alloc+0x32/0x1e0 [ 271.960308][T11448] inode_init_always+0x3f4/0xa50 [ 271.965252][T11448] ? set_qf_name+0x3d0/0x3d0 [ 271.969858][T11448] new_inode_pseudo+0x7b/0x240 [ 271.974634][T11448] new_inode+0x25/0x1d0 [ 271.978799][T11448] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 271.984356][T11448] __ext4_new_inode+0x561/0x5180 [ 271.989308][T11448] ? __dquot_initialize+0x1b3/0xc30 [ 271.994558][T11448] ext4_mknod+0x1ea/0x460 [ 271.998903][T11448] ? security_inode_mknod+0xe3/0x130 [ 272.004207][T11448] vfs_mknod+0x4e0/0x6a0 [ 272.006929][T11455] FAULT_INJECTION: forcing a failure. [ 272.006929][T11455] name failslab, interval 1, probability 0, space 0, times 0 [ 272.008462][T11448] do_mknodat+0x2eb/0x4d0 [ 272.008484][T11448] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 272.008497][T11448] do_syscall_64+0x73/0xe0 [ 272.008511][T11448] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 272.008523][T11448] RIP: 0033:0x45c369 [ 272.008535][T11448] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.008541][T11448] RSP: 002b:00007f48bc4d1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 272.008562][T11448] RAX: ffffffffffffffda RBX: 000000000001f4c0 RCX: 000000000045c369 [ 272.081934][T11448] RDX: 0000000000000701 RSI: 0000000000006000 RDI: 0000000020000040 [ 272.089912][T11448] RBP: 00007f48bc4d1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 272.097906][T11448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 272.105883][T11448] R13: 00007ffe5082970f R14: 00007f48bc4d29c0 R15: 000000000078bf0c [ 272.117929][T11455] CPU: 0 PID: 11455 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 272.126627][T11455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.137042][T11455] Call Trace: [ 272.140342][T11455] dump_stack+0x1f0/0x31e [ 272.144680][T11455] should_fail+0x38a/0x4e0 [ 272.149125][T11455] ? ext4_init_io_end+0x25/0x130 [ 272.154075][T11455] should_failslab+0x5/0x20 [ 272.158588][T11455] kmem_cache_alloc+0x53/0x2d0 [ 272.163364][T11455] ext4_init_io_end+0x25/0x130 [ 272.168136][T11455] ext4_writepages+0xa50/0x3750 [ 272.173007][T11455] ? __lock_acquire+0x116c/0x2c30 [ 272.178063][T11455] ? trace_lock_release+0x137/0x1a0 [ 272.183358][T11455] ? ext4_readpage+0x140/0x140 [ 272.188131][T11455] do_writepages+0xda/0x1f0 [ 272.192651][T11455] __filemap_fdatawrite_range+0x2a5/0x350 [ 272.198390][T11455] file_write_and_wait_range+0xed/0x1a0 [ 272.203949][T11455] ext4_sync_file+0x1af/0x7f0 [ 272.208637][T11455] ext4_buffered_write_iter+0x52e/0x5d0 [ 272.214192][T11455] ext4_file_write_iter+0x88d/0x1930 [ 272.219485][T11455] ? lock_acquire+0x160/0x720 [ 272.224177][T11455] ? lock_is_held_type+0x87/0xe0 [ 272.229135][T11455] ? iov_iter_init+0x83/0x160 [ 272.233824][T11455] vfs_write+0xa08/0xc70 [ 272.238114][T11455] ksys_write+0x11b/0x220 [ 272.242464][T11455] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 272.248564][T11455] do_syscall_64+0x73/0xe0 [ 272.253003][T11455] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 272.258904][T11455] RIP: 0033:0x45c369 [ 272.262799][T11455] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.282435][T11455] RSP: 002b:00007f487a07fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 13:07:37 executing program 0 (fault-call:0 fault-nth:6): mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) [ 272.290885][T11455] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 272.298887][T11455] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 272.306863][T11455] RBP: 00007f487a07fca0 R08: 0000000000000000 R09: 0000000000000000 [ 272.314865][T11455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 272.322839][T11455] R13: 00007ffc2382efcf R14: 00007f487a0809c0 R15: 000000000078bfac [ 272.394340][T11467] FAULT_INJECTION: forcing a failure. [ 272.394340][T11467] name failslab, interval 1, probability 0, space 0, times 0 [ 272.458029][T11467] CPU: 1 PID: 11467 Comm: syz-executor.0 Not tainted 5.8.0-rc7-syzkaller #0 [ 272.466849][T11467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.476944][T11467] Call Trace: [ 272.480247][T11467] dump_stack+0x1f0/0x31e [ 272.484584][T11467] should_fail+0x38a/0x4e0 [ 272.489007][T11467] ? ext4_alloc_inode+0x1b/0x500 [ 272.493952][T11467] should_failslab+0x5/0x20 [ 272.498461][T11467] kmem_cache_alloc+0x53/0x2d0 [ 272.503269][T11467] ? set_qf_name+0x3d0/0x3d0 [ 272.507843][T11467] ext4_alloc_inode+0x1b/0x500 [ 272.512601][T11467] ? set_qf_name+0x3d0/0x3d0 [ 272.517191][T11467] new_inode_pseudo+0x64/0x240 [ 272.521945][T11467] new_inode+0x25/0x1d0 [ 272.526098][T11467] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 272.531668][T11467] __ext4_new_inode+0x561/0x5180 [ 272.536612][T11467] ? __dquot_initialize+0x1b3/0xc30 [ 272.541800][T11467] ext4_mknod+0x1ea/0x460 [ 272.546136][T11467] ? security_inode_mknod+0xe3/0x130 [ 272.551408][T11467] vfs_mknod+0x4e0/0x6a0 [ 272.555669][T11467] do_mknodat+0x2eb/0x4d0 [ 272.560126][T11467] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 272.566202][T11467] do_syscall_64+0x73/0xe0 [ 272.570630][T11467] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 272.576524][T11467] RIP: 0033:0x45c369 [ 272.580422][T11467] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.600044][T11467] RSP: 002b:00007f48bc4d1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 272.608458][T11467] RAX: ffffffffffffffda RBX: 000000000001f4c0 RCX: 000000000045c369 [ 272.616447][T11467] RDX: 0000000000000701 RSI: 0000000000006000 RDI: 0000000020000040 [ 272.624697][T11467] RBP: 00007f48bc4d1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 272.632680][T11467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 272.640654][T11467] R13: 00007ffe5082970f R14: 00007f48bc4d29c0 R15: 000000000078bf0c 13:07:37 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x2) 13:07:37 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r1, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) 13:07:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2c, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:37 executing program 0 (fault-call:0 fault-nth:7): mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) 13:07:37 executing program 2 (fault-call:4 fault-nth:5): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) [ 272.751380][T11472] FAULT_INJECTION: forcing a failure. [ 272.751380][T11472] name failslab, interval 1, probability 0, space 0, times 0 [ 272.773613][T11472] CPU: 1 PID: 11472 Comm: syz-executor.0 Not tainted 5.8.0-rc7-syzkaller #0 [ 272.782312][T11472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.792377][T11472] Call Trace: [ 272.795674][T11472] dump_stack+0x1f0/0x31e [ 272.800014][T11472] should_fail+0x38a/0x4e0 [ 272.804449][T11472] ? security_inode_alloc+0x32/0x1e0 [ 272.809765][T11472] should_failslab+0x5/0x20 [ 272.814278][T11472] kmem_cache_alloc+0x53/0x2d0 [ 272.819053][T11472] security_inode_alloc+0x32/0x1e0 [ 272.824181][T11472] inode_init_always+0x3f4/0xa50 [ 272.829144][T11472] ? set_qf_name+0x3d0/0x3d0 [ 272.833739][T11472] new_inode_pseudo+0x7b/0x240 [ 272.838506][T11472] new_inode+0x25/0x1d0 [ 272.842691][T11472] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 272.848252][T11472] __ext4_new_inode+0x561/0x5180 [ 272.853210][T11472] ? __dquot_initialize+0x1b3/0xc30 [ 272.858426][T11472] ext4_mknod+0x1ea/0x460 [ 272.862765][T11472] ? security_inode_mknod+0xe3/0x130 [ 272.868054][T11472] vfs_mknod+0x4e0/0x6a0 [ 272.872331][T11472] do_mknodat+0x2eb/0x4d0 [ 272.876670][T11472] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 272.882740][T11472] do_syscall_64+0x73/0xe0 [ 272.887165][T11472] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 272.893076][T11472] RIP: 0033:0x45c369 [ 272.896986][T11472] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.916621][T11472] RSP: 002b:00007f48bc4d1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 272.925064][T11472] RAX: ffffffffffffffda RBX: 000000000001f4c0 RCX: 000000000045c369 [ 272.933136][T11472] RDX: 0000000000000701 RSI: 0000000000006000 RDI: 0000000020000040 [ 272.941122][T11472] RBP: 00007f48bc4d1ca0 R08: 0000000000000000 R09: 0000000000000000 13:07:38 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x30) 13:07:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 272.949140][T11472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 272.957147][T11472] R13: 00007ffe5082970f R14: 00007f48bc4d29c0 R15: 000000000078bf0c [ 272.966063][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 272.966074][ T29] audit: type=1804 audit(1595941657.830:103): pid=11477 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/117/bus" dev="sda1" ino=16097 res=1 [ 273.052524][T11489] FAULT_INJECTION: forcing a failure. [ 273.052524][T11489] name failslab, interval 1, probability 0, space 0, times 0 [ 273.065452][T11489] CPU: 1 PID: 11489 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 273.066973][T11492] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 273.074131][T11489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.074137][T11489] Call Trace: [ 273.074157][T11489] dump_stack+0x1f0/0x31e [ 273.074174][T11489] should_fail+0x38a/0x4e0 [ 273.074190][T11489] ? ext4_init_io_end+0x25/0x130 [ 273.074202][T11489] should_failslab+0x5/0x20 [ 273.074213][T11489] kmem_cache_alloc+0x53/0x2d0 [ 273.074227][T11489] ? lock_is_held_type+0x87/0xe0 [ 273.074243][T11489] ext4_init_io_end+0x25/0x130 [ 273.074258][T11489] ext4_writepages+0xb8e/0x3750 [ 273.074290][T11489] ? __lock_acquire+0x116c/0x2c30 [ 273.074333][T11489] ? trace_lock_release+0x137/0x1a0 [ 273.118744][ T29] audit: type=1804 audit(1595941657.830:104): pid=11477 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/117/bus" dev="sda1" ino=16097 res=1 [ 273.119334][T11489] ? ext4_readpage+0x140/0x140 [ 273.119351][T11489] do_writepages+0xda/0x1f0 [ 273.119376][T11489] __filemap_fdatawrite_range+0x2a5/0x350 [ 273.119396][T11489] file_write_and_wait_range+0xed/0x1a0 [ 273.186746][T11489] ext4_sync_file+0x1af/0x7f0 [ 273.187321][T11492] 8021q: adding VLAN 0 to HW filter on device bond25 [ 273.191423][T11489] ext4_buffered_write_iter+0x52e/0x5d0 [ 273.191442][T11489] ext4_file_write_iter+0x88d/0x1930 [ 273.191457][T11489] ? lock_acquire+0x160/0x720 [ 273.191480][T11489] ? lock_is_held_type+0x87/0xe0 [ 273.218596][T11489] ? iov_iter_init+0x83/0x160 [ 273.223256][T11489] vfs_write+0xa08/0xc70 [ 273.227521][T11489] ksys_write+0x11b/0x220 [ 273.232032][T11489] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 273.238101][T11489] do_syscall_64+0x73/0xe0 [ 273.242547][T11489] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 273.248442][T11489] RIP: 0033:0x45c369 [ 273.252370][T11489] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.271980][T11489] RSP: 002b:00007f487a0a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 273.280395][T11489] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 273.288455][T11489] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 13:07:38 executing program 0 (fault-call:0 fault-nth:8): mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) [ 273.296433][T11489] RBP: 00007f487a0a0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 273.304427][T11489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 273.312398][T11489] R13: 00007ffc2382efcf R14: 00007f487a0a19c0 R15: 000000000078bf0c 13:07:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2d, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:38 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r1, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) [ 273.411862][ T29] audit: type=1804 audit(1595941658.460:105): pid=11537 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/118/bus" dev="sda1" ino=16174 res=1 [ 273.423255][T11538] FAULT_INJECTION: forcing a failure. [ 273.423255][T11538] name failslab, interval 1, probability 0, space 0, times 0 [ 273.525377][T11538] CPU: 1 PID: 11538 Comm: syz-executor.0 Not tainted 5.8.0-rc7-syzkaller #0 [ 273.534076][T11538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.544128][T11538] Call Trace: [ 273.547424][T11538] dump_stack+0x1f0/0x31e [ 273.551757][T11538] should_fail+0x38a/0x4e0 [ 273.556180][T11538] ? smack_inode_init_security+0x3b3/0x470 [ 273.561987][T11538] should_failslab+0x5/0x20 [ 273.566490][T11538] __kmalloc_track_caller+0x72/0x320 [ 273.571775][T11538] ? rcu_lock_release+0x5/0x20 [ 273.576800][T11538] kstrdup+0x31/0x70 [ 273.580694][T11538] smack_inode_init_security+0x3b3/0x470 [ 273.586340][T11538] security_inode_init_security+0xf9/0x300 [ 273.592175][T11538] ? ext4_init_security+0x40/0x40 [ 273.597216][T11538] __ext4_new_inode+0x3f6b/0x5180 [ 273.602291][T11538] ext4_mknod+0x1ea/0x460 [ 273.606625][T11538] ? security_inode_mknod+0xe3/0x130 [ 273.611917][T11538] vfs_mknod+0x4e0/0x6a0 [ 273.616172][T11538] do_mknodat+0x2eb/0x4d0 [ 273.620596][T11538] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 273.626760][T11538] do_syscall_64+0x73/0xe0 [ 273.631208][T11538] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 273.637100][T11538] RIP: 0033:0x45c369 [ 273.640998][T11538] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.660625][T11538] RSP: 002b:00007f48bc4d1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 273.669155][T11538] RAX: ffffffffffffffda RBX: 000000000001f4c0 RCX: 000000000045c369 [ 273.677130][T11538] RDX: 0000000000000701 RSI: 0000000000006000 RDI: 0000000020000040 [ 273.685130][T11538] RBP: 00007f48bc4d1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 273.693098][T11538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 273.701054][T11538] R13: 00007ffe5082970f R14: 00007f48bc4d29c0 R15: 000000000078bf0c 13:07:38 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x2000) 13:07:38 executing program 0 (fault-call:0 fault-nth:9): mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) [ 273.721808][ T29] audit: type=1804 audit(1595941658.770:106): pid=11537 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/118/bus" dev="sda1" ino=16174 res=1 13:07:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x35, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:38 executing program 2 (fault-call:4 fault-nth:6): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:07:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:39 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x3000) [ 273.926715][T11563] FAULT_INJECTION: forcing a failure. [ 273.926715][T11563] name failslab, interval 1, probability 0, space 0, times 0 [ 273.956595][T11569] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 273.965121][T11563] CPU: 1 PID: 11563 Comm: syz-executor.0 Not tainted 5.8.0-rc7-syzkaller #0 [ 273.967543][ T29] audit: type=1804 audit(1595941658.880:107): pid=11557 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/119/bus" dev="sda1" ino=16167 res=1 [ 273.973823][T11563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.973830][T11563] Call Trace: [ 273.973850][T11563] dump_stack+0x1f0/0x31e [ 273.973865][T11563] should_fail+0x38a/0x4e0 [ 273.973878][T11563] ? smack_d_instantiate+0x89d/0xce0 [ 273.973891][T11563] should_failslab+0x5/0x20 [ 273.973902][T11563] kmem_cache_alloc_trace+0x57/0x300 [ 273.973915][T11563] ? lockdep_hardirqs_on+0x38/0xe0 [ 273.973931][T11563] smack_d_instantiate+0x89d/0xce0 [ 273.973955][T11563] security_d_instantiate+0xa5/0x100 [ 273.973971][T11563] d_instantiate_new+0x61/0x110 [ 273.973986][T11563] ext4_add_nondir+0x20a/0x270 [ 273.974004][T11563] ext4_mknod+0x368/0x460 [ 274.026716][ T29] audit: type=1804 audit(1595941658.890:108): pid=11557 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/119/bus" dev="sda1" ino=16167 res=1 [ 274.027994][T11563] vfs_mknod+0x4e0/0x6a0 [ 274.028014][T11563] do_mknodat+0x2eb/0x4d0 [ 274.093295][T11563] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 274.099365][T11563] do_syscall_64+0x73/0xe0 [ 274.103787][T11563] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 274.109681][T11563] RIP: 0033:0x45c369 [ 274.113453][ T29] audit: type=1804 audit(1595941659.030:109): pid=11580 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/120/bus" dev="sda1" ino=16190 res=1 [ 274.113578][T11563] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.155235][T11563] RSP: 002b:00007f48bc4d1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 274.163653][T11563] RAX: ffffffffffffffda RBX: 000000000001f4c0 RCX: 000000000045c369 [ 274.171636][T11563] RDX: 0000000000000701 RSI: 0000000000006000 RDI: 0000000020000040 [ 274.179241][T11569] 8021q: adding VLAN 0 to HW filter on device bond26 [ 274.179616][T11563] RBP: 00007f48bc4d1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 274.179629][T11563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 274.189850][T11575] FAULT_INJECTION: forcing a failure. [ 274.189850][T11575] name failslab, interval 1, probability 0, space 0, times 0 [ 274.194292][T11563] R13: 00007ffe5082970f R14: 00007f48bc4d29c0 R15: 000000000078bf0c 13:07:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:39 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x3f00) [ 274.232987][ T29] audit: type=1804 audit(1595941659.280:110): pid=11580 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/120/bus" dev="sda1" ino=16190 res=1 13:07:39 executing program 0 (fault-call:0 fault-nth:10): mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) 13:07:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x5c, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 274.321389][T11619] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 274.369065][ T29] audit: type=1804 audit(1595941659.390:111): pid=11620 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/121/bus" dev="sda1" ino=16190 res=1 [ 274.425156][T11575] CPU: 1 PID: 11575 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 274.433878][T11575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.443934][T11575] Call Trace: [ 274.447489][T11575] dump_stack+0x1f0/0x31e [ 274.451827][T11575] should_fail+0x38a/0x4e0 [ 274.456249][T11575] ? ext4_alloc_io_end_vec+0x27/0x160 [ 274.461617][T11575] should_failslab+0x5/0x20 [ 274.466129][T11575] kmem_cache_alloc+0x53/0x2d0 [ 274.470901][T11575] ? lock_is_held_type+0x87/0xe0 [ 274.475845][T11575] ext4_alloc_io_end_vec+0x27/0x160 [ 274.481752][T11575] ext4_writepages+0x10f8/0x3750 [ 274.486717][T11575] ? __lock_acquire+0x116c/0x2c30 [ 274.491779][T11575] ? trace_lock_release+0x137/0x1a0 [ 274.496999][T11575] ? ext4_readpage+0x140/0x140 [ 274.502475][T11575] do_writepages+0xda/0x1f0 [ 274.507007][T11575] __filemap_fdatawrite_range+0x2a5/0x350 [ 274.512760][T11575] file_write_and_wait_range+0xed/0x1a0 [ 274.518332][T11575] ext4_sync_file+0x1af/0x7f0 [ 274.523031][T11575] ext4_buffered_write_iter+0x52e/0x5d0 [ 274.528603][T11575] ext4_file_write_iter+0x88d/0x1930 [ 274.533915][T11575] ? lock_acquire+0x160/0x720 [ 274.538617][T11575] ? lock_is_held_type+0x87/0xe0 [ 274.543574][T11575] ? iov_iter_init+0x83/0x160 [ 274.548272][T11575] vfs_write+0xa08/0xc70 [ 274.552548][T11575] ksys_write+0x11b/0x220 [ 274.556898][T11575] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 274.563007][T11575] do_syscall_64+0x73/0xe0 [ 274.567455][T11575] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 274.573391][T11575] RIP: 0033:0x45c369 [ 274.577300][T11575] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.597822][T11575] RSP: 002b:00007f487a07fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 274.606251][T11575] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 274.614283][T11575] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 274.623228][T11575] RBP: 00007f487a07fca0 R08: 0000000000000000 R09: 0000000000000000 [ 274.631214][T11575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 274.639237][T11575] R13: 00007ffc2382efcf R14: 00007f487a0809c0 R15: 000000000078bfac [ 274.649280][T11629] FAULT_INJECTION: forcing a failure. [ 274.649280][T11629] name failslab, interval 1, probability 0, space 0, times 0 [ 274.671417][T11629] CPU: 0 PID: 11629 Comm: syz-executor.0 Not tainted 5.8.0-rc7-syzkaller #0 [ 274.680127][T11629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.690230][T11629] Call Trace: [ 274.693538][T11629] dump_stack+0x1f0/0x31e [ 274.698418][T11629] should_fail+0x38a/0x4e0 [ 274.700084][T11619] 8021q: adding VLAN 0 to HW filter on device bond27 [ 274.702873][T11629] ? kzalloc+0x16/0x30 [ 274.702886][T11629] should_failslab+0x5/0x20 [ 274.702898][T11629] __kmalloc+0x74/0x330 [ 274.702915][T11629] kzalloc+0x16/0x30 [ 274.702926][T11629] smk_parse_smack+0x189/0x220 [ 274.702939][T11629] smk_import_entry+0x22/0x550 [ 274.702956][T11629] smack_d_instantiate+0x6bb/0xce0 [ 274.702980][T11629] security_d_instantiate+0xa5/0x100 [ 274.747556][T11629] d_instantiate_new+0x61/0x110 [ 274.752419][T11629] ext4_add_nondir+0x20a/0x270 [ 274.757204][T11629] ext4_mknod+0x368/0x460 [ 274.761652][T11629] vfs_mknod+0x4e0/0x6a0 [ 274.766272][T11629] do_mknodat+0x2eb/0x4d0 [ 274.770978][T11629] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 274.777066][T11629] do_syscall_64+0x73/0xe0 [ 274.781508][T11629] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 274.787442][T11629] RIP: 0033:0x45c369 [ 274.791344][T11629] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.810957][T11629] RSP: 002b:00007f48bc4d1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 13:07:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 274.819413][T11629] RAX: ffffffffffffffda RBX: 000000000001f4c0 RCX: 000000000045c369 [ 274.827415][T11629] RDX: 0000000000000701 RSI: 0000000000006000 RDI: 0000000020000040 [ 274.835449][T11629] RBP: 00007f48bc4d1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 274.843438][T11629] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 274.851436][T11629] R13: 00007ffe5082970f R14: 00007f48bc4d29c0 R15: 000000000078bf0c 13:07:39 executing program 2 (fault-call:4 fault-nth:7): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) [ 274.879024][ T29] audit: type=1804 audit(1595941659.930:112): pid=11620 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/121/bus" dev="sda1" ino=16190 res=1 13:07:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x164, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:40 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xff0f) 13:07:40 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 274.946059][T11676] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:07:40 executing program 0 (fault-call:0 fault-nth:11): mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) [ 275.020015][T11682] FAULT_INJECTION: forcing a failure. [ 275.020015][T11682] name failslab, interval 1, probability 0, space 0, times 0 [ 275.074322][T11676] 8021q: adding VLAN 0 to HW filter on device bond28 [ 275.110829][T11682] CPU: 1 PID: 11682 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 275.119776][T11682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.130203][T11682] Call Trace: [ 275.133566][T11682] dump_stack+0x1f0/0x31e [ 275.138035][T11682] should_fail+0x38a/0x4e0 [ 275.147220][T11682] ? kcalloc+0x32/0x60 [ 275.151598][T11682] should_failslab+0x5/0x20 [ 275.156574][T11682] __kmalloc+0x74/0x330 [ 275.160811][T11682] kcalloc+0x32/0x60 [ 275.165024][T11682] ext4_find_extent+0x252/0xd30 [ 275.170105][T11682] ? trace_ext4_ext_map_blocks_enter+0x28d/0x2d0 [ 275.176633][T11682] ext4_ext_map_blocks+0x149/0x6d20 [ 275.181854][T11682] ? file_write_and_wait_range+0xed/0x1a0 [ 275.187676][T11682] ? ext4_file_write_iter+0x88d/0x1930 [ 275.193181][T11682] ? lock_acquire+0x160/0x720 [ 275.197866][T11682] ? ext4_map_blocks+0x7ea/0x19e0 [ 275.202912][T11682] ext4_map_blocks+0x8c1/0x19e0 [ 275.208091][T11682] ? trace_kmem_cache_alloc+0xcb/0x120 [ 275.213587][T11682] ext4_writepages+0x150c/0x3750 [ 275.219168][T11682] ? trace_lock_release+0x137/0x1a0 [ 275.224414][T11682] ? ext4_readpage+0x140/0x140 [ 275.229172][T11682] do_writepages+0xda/0x1f0 [ 275.233679][T11682] __filemap_fdatawrite_range+0x2a5/0x350 [ 275.239660][T11682] file_write_and_wait_range+0xed/0x1a0 [ 275.245425][T11682] ext4_sync_file+0x1af/0x7f0 [ 275.250651][T11682] ext4_buffered_write_iter+0x52e/0x5d0 [ 275.256676][T11682] ext4_file_write_iter+0x88d/0x1930 [ 275.262425][T11682] ? lock_acquire+0x160/0x720 [ 275.267710][T11682] ? lock_is_held_type+0x87/0xe0 [ 275.272939][T11682] ? iov_iter_init+0x83/0x160 [ 275.278304][T11682] vfs_write+0xa08/0xc70 [ 275.282625][T11682] ksys_write+0x11b/0x220 [ 275.287185][T11682] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 275.293797][T11682] do_syscall_64+0x73/0xe0 [ 275.298403][T11682] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 275.305035][T11682] RIP: 0033:0x45c369 [ 275.308988][T11682] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.329560][T11682] RSP: 002b:00007f487a07fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 275.339053][T11682] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 275.347374][T11682] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 275.356144][T11682] RBP: 00007f487a07fca0 R08: 0000000000000000 R09: 0000000000000000 [ 275.365842][T11682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 13:07:40 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x200000) 13:07:40 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) 13:07:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 275.374669][T11682] R13: 00007ffc2382efcf R14: 00007f487a0809c0 R15: 000000000078bfac 13:07:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x1c6, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:40 executing program 2 (fault-call:4 fault-nth:8): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:07:40 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1) [ 275.515340][T11736] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 275.636812][T11736] 8021q: adding VLAN 0 to HW filter on device bond29 [ 275.665076][T11785] FAULT_INJECTION: forcing a failure. [ 275.665076][T11785] name failslab, interval 1, probability 0, space 0, times 0 [ 275.685874][T11785] CPU: 1 PID: 11785 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 275.695151][T11785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.705937][T11785] Call Trace: [ 275.709340][T11785] dump_stack+0x1f0/0x31e [ 275.714131][T11785] should_fail+0x38a/0x4e0 [ 275.718778][T11785] ? ext4_mb_new_blocks+0x2b6/0x1710 [ 275.724412][T11785] should_failslab+0x5/0x20 [ 275.728918][T11785] kmem_cache_alloc+0x53/0x2d0 [ 275.733779][T11785] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 275.739334][T11785] ext4_mb_new_blocks+0x2b6/0x1710 [ 275.744559][T11785] ext4_ext_map_blocks+0x2ad5/0x6d20 [ 275.750212][T11785] ? ext4_map_blocks+0x7ea/0x19e0 [ 275.755433][T11785] ext4_map_blocks+0x8c1/0x19e0 [ 275.760612][T11785] ? trace_kmem_cache_alloc+0xcb/0x120 [ 275.766894][T11785] ext4_writepages+0x150c/0x3750 [ 275.772213][T11785] ? trace_lock_release+0x137/0x1a0 [ 275.777597][T11785] ? ext4_readpage+0x140/0x140 [ 275.782456][T11785] do_writepages+0xda/0x1f0 [ 275.787211][T11785] __filemap_fdatawrite_range+0x2a5/0x350 [ 275.793535][T11785] file_write_and_wait_range+0xed/0x1a0 [ 275.799363][T11785] ext4_sync_file+0x1af/0x7f0 [ 275.804202][T11785] ext4_buffered_write_iter+0x52e/0x5d0 [ 275.810412][T11785] ext4_file_write_iter+0x88d/0x1930 [ 275.815710][T11785] ? lock_acquire+0x160/0x720 [ 275.820648][T11785] ? lock_is_held_type+0x87/0xe0 [ 275.826130][T11785] ? iov_iter_init+0x83/0x160 [ 275.831088][T11785] vfs_write+0xa08/0xc70 [ 275.835460][T11785] ksys_write+0x11b/0x220 [ 275.840194][T11785] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 275.846739][T11785] do_syscall_64+0x73/0xe0 [ 275.851353][T11785] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 275.858242][T11785] RIP: 0033:0x45c369 [ 275.862394][T11785] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:07:41 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x4000, 0x1) [ 275.883033][T11785] RSP: 002b:00007f487a07fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 275.900938][T11785] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 275.909236][T11785] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 275.918364][T11785] RBP: 00007f487a07fca0 R08: 0000000000000000 R09: 0000000000000000 [ 275.927024][T11785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 275.936008][T11785] R13: 00007ffc2382efcf R14: 00007f487a0809c0 R15: 000000000078bfac 13:07:41 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:41 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x300000) 13:07:41 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6002, 0x1) 13:07:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:41 executing program 2 (fault-call:4 fault-nth:9): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:07:41 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x1000000) 13:07:41 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6003, 0x1) [ 276.193736][T11802] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:07:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 276.248093][T11802] 8021q: adding VLAN 0 to HW filter on device bond30 [ 276.274656][T11807] FAULT_INJECTION: forcing a failure. [ 276.274656][T11807] name failslab, interval 1, probability 0, space 0, times 0 [ 276.289262][T11807] CPU: 0 PID: 11807 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 276.298215][T11807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.308957][T11807] Call Trace: [ 276.312270][T11807] dump_stack+0x1f0/0x31e [ 276.316798][T11807] should_fail+0x38a/0x4e0 [ 276.321525][T11807] ? __es_insert_extent+0x7a4/0x1770 [ 276.327269][T11807] should_failslab+0x5/0x20 [ 276.332180][T11807] kmem_cache_alloc+0x53/0x2d0 [ 276.336972][T11807] __es_insert_extent+0x7a4/0x1770 [ 276.342230][T11807] ext4_es_insert_extent+0x22b/0x2c30 13:07:41 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6004, 0x1) [ 276.347813][T11807] ? ext4_es_lookup_extent+0x2e8/0x670 [ 276.353591][T11807] ext4_map_blocks+0xdad/0x19e0 [ 276.358833][T11807] ext4_writepages+0x150c/0x3750 [ 276.364173][T11807] ? trace_lock_release+0x137/0x1a0 [ 276.369840][T11807] ? ext4_readpage+0x140/0x140 [ 276.375134][T11807] do_writepages+0xda/0x1f0 [ 276.379671][T11807] __filemap_fdatawrite_range+0x2a5/0x350 [ 276.385611][T11807] file_write_and_wait_range+0xed/0x1a0 [ 276.391532][T11807] ext4_sync_file+0x1af/0x7f0 13:07:41 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x2000000) [ 276.397578][T11807] ext4_buffered_write_iter+0x52e/0x5d0 [ 276.403297][T11807] ext4_file_write_iter+0x88d/0x1930 [ 276.410866][T11807] ? lock_acquire+0x160/0x720 [ 276.415662][T11807] ? lock_is_held_type+0x87/0xe0 [ 276.420622][T11807] ? iov_iter_init+0x83/0x160 [ 276.425475][T11807] vfs_write+0xa08/0xc70 [ 276.429823][T11807] ksys_write+0x11b/0x220 [ 276.434472][T11807] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 276.441039][T11807] do_syscall_64+0x73/0xe0 [ 276.445666][T11807] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 276.452323][T11807] RIP: 0033:0x45c369 [ 276.456223][T11807] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.476364][T11807] RSP: 002b:00007f487a0a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 276.485126][T11807] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 276.493490][T11807] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 276.501822][T11807] RBP: 00007f487a0a0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 276.509892][T11807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 276.517969][T11807] R13: 00007ffc2382efcf R14: 00007f487a0a19c0 R15: 000000000078bf0c 13:07:41 executing program 2 (fault-call:4 fault-nth:10): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) [ 276.647797][T11855] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 276.718639][T11855] 8021q: adding VLAN 0 to HW filter on device bond31 [ 276.734864][T11862] FAULT_INJECTION: forcing a failure. [ 276.734864][T11862] name failslab, interval 1, probability 0, space 0, times 0 [ 276.760653][T11862] CPU: 1 PID: 11862 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 276.769452][T11862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.779974][T11862] Call Trace: [ 276.786374][T11862] dump_stack+0x1f0/0x31e [ 276.790754][T11862] should_fail+0x38a/0x4e0 [ 276.795836][T11862] ? mempool_alloc_slab+0x49/0x70 [ 276.800987][T11862] should_failslab+0x5/0x20 [ 276.805595][T11862] kmem_cache_alloc+0x53/0x2d0 [ 276.810704][T11862] mempool_alloc_slab+0x49/0x70 [ 276.815755][T11862] ? mempool_free+0x380/0x380 [ 276.820454][T11862] mempool_alloc+0xf1/0x5a0 [ 276.825007][T11862] bio_alloc_bioset+0x1b6/0x5e0 [ 276.830274][T11862] ext4_bio_write_page+0x1176/0x1a10 [ 276.836018][T11862] mpage_submit_page+0x1ae/0x230 [ 276.841370][T11862] ext4_writepages+0x1c5d/0x3750 [ 276.846815][T11862] ? trace_lock_release+0x137/0x1a0 [ 276.852295][T11862] ? ext4_readpage+0x140/0x140 [ 276.857088][T11862] do_writepages+0xda/0x1f0 [ 276.861856][T11862] __filemap_fdatawrite_range+0x2a5/0x350 [ 276.867795][T11862] file_write_and_wait_range+0xed/0x1a0 [ 276.873620][T11862] ext4_sync_file+0x1af/0x7f0 [ 276.878574][T11862] ext4_buffered_write_iter+0x52e/0x5d0 [ 276.884501][T11862] ext4_file_write_iter+0x88d/0x1930 [ 276.890046][T11862] ? lock_acquire+0x160/0x720 [ 276.894758][T11862] ? lock_is_held_type+0x87/0xe0 [ 276.899968][T11862] ? iov_iter_init+0x83/0x160 [ 276.904671][T11862] vfs_write+0xa08/0xc70 [ 276.909202][T11862] ksys_write+0x11b/0x220 [ 276.913706][T11862] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 276.919887][T11862] do_syscall_64+0x73/0xe0 [ 276.924348][T11862] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 276.930780][T11862] RIP: 0033:0x45c369 [ 276.934980][T11862] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.957175][T11862] RSP: 002b:00007f487a0a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 276.965987][T11862] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 276.974440][T11862] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 276.983098][T11862] RBP: 00007f487a0a0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 276.991202][T11862] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 276.999205][T11862] R13: 00007ffc2382efcf R14: 00007f487a0a19c0 R15: 000000000078bf0c 13:07:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x0, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x3fa, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:42 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6005, 0x1) 13:07:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:42 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x20000000) 13:07:42 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6006, 0x1) [ 277.143431][T11910] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:07:42 executing program 2 (fault-call:4 fault-nth:11): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:07:42 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6007, 0x1) [ 277.327302][T11910] 8021q: adding VLAN 0 to HW filter on device bond32 13:07:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x0, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x3fb, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 277.375319][T11959] FAULT_INJECTION: forcing a failure. [ 277.375319][T11959] name failslab, interval 1, probability 0, space 0, times 0 [ 277.441400][T11959] CPU: 1 PID: 11959 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 277.450325][T11959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.460493][T11959] Call Trace: [ 277.463816][T11959] dump_stack+0x1f0/0x31e [ 277.468179][T11959] should_fail+0x38a/0x4e0 [ 277.472998][T11959] ? mempool_alloc_slab+0x49/0x70 [ 277.478058][T11959] should_failslab+0x5/0x20 [ 277.482577][T11959] kmem_cache_alloc+0x53/0x2d0 [ 277.487512][T11959] mempool_alloc_slab+0x49/0x70 [ 277.492461][T11959] ? mempool_free+0x380/0x380 [ 277.497252][T11959] mempool_alloc+0xf1/0x5a0 [ 277.502066][T11959] ? mempool_alloc_slab+0x58/0x70 [ 277.507113][T11959] ? mempool_alloc+0xfe/0x5a0 [ 277.511819][T11959] bvec_alloc+0x149/0x190 [ 277.516362][T11959] bio_alloc_bioset+0x36e/0x5e0 [ 277.521240][T11959] ext4_bio_write_page+0x1176/0x1a10 [ 277.526560][T11959] mpage_submit_page+0x1ae/0x230 [ 277.531520][T11959] ext4_writepages+0x1c5d/0x3750 [ 277.536528][T11959] ? trace_lock_release+0x137/0x1a0 [ 277.541753][T11959] ? ext4_readpage+0x140/0x140 [ 277.546540][T11959] do_writepages+0xda/0x1f0 [ 277.551570][T11959] __filemap_fdatawrite_range+0x2a5/0x350 [ 277.557747][T11959] file_write_and_wait_range+0xed/0x1a0 [ 277.563440][T11959] ext4_sync_file+0x1af/0x7f0 [ 277.568313][T11959] ext4_buffered_write_iter+0x52e/0x5d0 [ 277.574078][T11959] ext4_file_write_iter+0x88d/0x1930 [ 277.579696][T11959] ? lock_acquire+0x160/0x720 [ 277.584503][T11959] ? lock_is_held_type+0x87/0xe0 [ 277.589468][T11959] ? iov_iter_init+0x83/0x160 [ 277.594497][T11959] vfs_write+0xa08/0xc70 [ 277.598882][T11959] ksys_write+0x11b/0x220 [ 277.603394][T11959] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 277.609752][T11959] do_syscall_64+0x73/0xe0 [ 277.614194][T11959] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 277.620103][T11959] RIP: 0033:0x45c369 13:07:42 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x3f000000) 13:07:42 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6008, 0x1) 13:07:42 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6009, 0x1) 13:07:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x0, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:42 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x600a, 0x1) [ 277.624217][T11959] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.644196][T11959] RSP: 002b:00007f487a0a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 277.652894][T11959] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 277.662268][T11959] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 277.670349][T11959] RBP: 00007f487a0a0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 277.678582][T11959] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 277.686916][T11959] R13: 00007ffc2382efcf R14: 00007f487a0a19c0 R15: 000000000078bf0c 13:07:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:42 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x600b, 0x1) 13:07:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x0, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 277.807939][T11992] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:07:42 executing program 2 (fault-call:4 fault-nth:12): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:07:42 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xeaffffff) 13:07:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:42 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x600c, 0x1) [ 277.877991][T11992] 8021q: adding VLAN 0 to HW filter on device bond33 13:07:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x0, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 277.983065][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 277.983075][ T29] audit: type=1804 audit(1595941663.040:127): pid=12038 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/129/bus" dev="sda1" ino=16207 res=1 [ 278.048073][T12041] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 278.050654][T12043] FAULT_INJECTION: forcing a failure. [ 278.050654][T12043] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 278.070215][T12043] CPU: 0 PID: 12043 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 278.079109][T12043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.089744][T12043] Call Trace: [ 278.093349][T12043] dump_stack+0x1f0/0x31e [ 278.097935][T12043] should_fail+0x38a/0x4e0 [ 278.108803][T12043] prepare_alloc_pages+0x28c/0x4a0 [ 278.113935][T12043] __alloc_pages_nodemask+0xbc/0x5e0 [ 278.120396][T12043] kmem_getpages+0x49/0x900 [ 278.125166][T12043] cache_grow_begin+0x7b/0x2e0 [ 278.130186][T12043] cache_alloc_refill+0x359/0x3f0 [ 278.135374][T12043] ? lock_is_held_type+0x87/0xe0 [ 278.138312][T12041] 8021q: adding VLAN 0 to HW filter on device bond34 [ 278.140422][T12043] ? check_preemption_disabled+0x51/0x140 [ 278.153952][T12043] ? mempool_alloc_slab+0x49/0x70 [ 278.159128][T12043] kmem_cache_alloc+0x2b5/0x2d0 [ 278.164104][T12043] mempool_alloc_slab+0x49/0x70 [ 278.164816][ T29] audit: type=1804 audit(1595941663.080:128): pid=12038 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/129/bus" dev="sda1" ino=16207 res=1 [ 278.169152][T12043] ? mempool_free+0x380/0x380 [ 278.169164][T12043] mempool_alloc+0xf1/0x5a0 [ 278.169175][T12043] ? mempool_alloc_slab+0x58/0x70 [ 278.169190][T12043] ? mempool_alloc+0xfe/0x5a0 [ 278.212046][T12043] bvec_alloc+0x149/0x190 [ 278.217120][T12043] bio_alloc_bioset+0x36e/0x5e0 [ 278.222444][T12043] ext4_bio_write_page+0x1176/0x1a10 [ 278.228164][T12043] mpage_submit_page+0x1ae/0x230 [ 278.233132][T12043] ext4_writepages+0x1c5d/0x3750 [ 278.238222][T12043] ? trace_lock_release+0x137/0x1a0 [ 278.243707][T12043] ? ext4_readpage+0x140/0x140 [ 278.248762][T12043] do_writepages+0xda/0x1f0 [ 278.253819][T12043] __filemap_fdatawrite_range+0x2a5/0x350 [ 278.259994][T12043] file_write_and_wait_range+0xed/0x1a0 [ 278.265570][T12043] ext4_sync_file+0x1af/0x7f0 [ 278.270435][T12043] ext4_buffered_write_iter+0x52e/0x5d0 [ 278.276008][T12043] ext4_file_write_iter+0x88d/0x1930 [ 278.282255][T12043] ? lock_acquire+0x160/0x720 [ 278.287140][T12043] ? lock_is_held_type+0x87/0xe0 [ 278.292248][T12043] ? iov_iter_init+0x83/0x160 [ 278.297143][T12043] vfs_write+0xa08/0xc70 [ 278.301426][T12043] ksys_write+0x11b/0x220 [ 278.305780][T12043] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.312185][T12043] do_syscall_64+0x73/0xe0 [ 278.317016][T12043] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.322928][T12043] RIP: 0033:0x45c369 [ 278.326841][T12043] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:07:43 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x600d, 0x1) 13:07:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x0, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:43 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xefffffff) 13:07:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 278.347248][T12043] RSP: 002b:00007f487a0a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 278.355770][T12043] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 278.363769][T12043] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 278.371853][T12043] RBP: 00007f487a0a0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 278.380280][T12043] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 278.388394][T12043] R13: 00007ffc2382efcf R14: 00007f487a0a19c0 R15: 000000000078bf0c 13:07:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:43 executing program 2 (fault-call:4 fault-nth:13): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) [ 278.508887][T12091] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 278.518306][ T29] audit: type=1804 audit(1595941663.560:129): pid=12089 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/130/bus" dev="sda1" ino=16211 res=1 13:07:43 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x600e, 0x1) [ 278.638218][T12100] FAULT_INJECTION: forcing a failure. [ 278.638218][T12100] name failslab, interval 1, probability 0, space 0, times 0 [ 278.675354][T12100] CPU: 0 PID: 12100 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 278.684383][T12100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.690684][T12091] 8021q: adding VLAN 0 to HW filter on device bond35 [ 278.695803][T12100] Call Trace: [ 278.695826][T12100] dump_stack+0x1f0/0x31e [ 278.695843][T12100] should_fail+0x38a/0x4e0 [ 278.695869][T12100] should_failslab+0x5/0x20 [ 278.695888][T12100] kmem_cache_alloc_node+0x64/0x290 [ 278.695907][T12100] ? create_task_io_context+0x2c/0x3d0 [ 278.695922][T12100] create_task_io_context+0x2c/0x3d0 [ 278.695938][T12100] generic_make_request_checks+0x12d2/0x17d0 [ 278.695972][T12100] generic_make_request+0x36/0xab0 [ 278.695998][T12100] ? mpage_release_unused_pages+0x154/0x790 [ 278.696012][T12100] submit_bio+0x1a4/0x620 [ 278.696033][T12100] ext4_io_submit+0x151/0x200 [ 278.696050][T12100] ext4_writepages+0x1155/0x3750 [ 278.696115][T12100] ? trace_lock_release+0x137/0x1a0 [ 278.696129][T12100] ? ext4_readpage+0x140/0x140 [ 278.696144][T12100] do_writepages+0xda/0x1f0 [ 278.696168][T12100] __filemap_fdatawrite_range+0x2a5/0x350 [ 278.696191][T12100] file_write_and_wait_range+0xed/0x1a0 [ 278.794382][T12100] ext4_sync_file+0x1af/0x7f0 [ 278.799488][T12100] ext4_buffered_write_iter+0x52e/0x5d0 [ 278.805407][T12100] ext4_file_write_iter+0x88d/0x1930 [ 278.810728][T12100] ? lock_acquire+0x160/0x720 [ 278.815608][T12100] ? lock_is_held_type+0x87/0xe0 [ 278.820832][T12100] ? iov_iter_init+0x83/0x160 [ 278.826015][T12100] vfs_write+0xa08/0xc70 [ 278.830393][T12100] ksys_write+0x11b/0x220 [ 278.835090][T12100] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.841177][T12100] do_syscall_64+0x73/0xe0 [ 278.845610][T12100] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.851519][T12100] RIP: 0033:0x45c369 [ 278.855430][T12100] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.875143][T12100] RSP: 002b:00007f487a07fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 278.883748][T12100] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 278.893584][T12100] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 278.902173][T12100] RBP: 00007f487a07fca0 R08: 0000000000000000 R09: 0000000000000000 [ 278.910583][T12100] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 278.919343][T12100] R13: 00007ffc2382efcf R14: 00007f487a0809c0 R15: 000000000078bfac 13:07:44 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 278.950996][ T29] audit: type=1804 audit(1595941664.000:130): pid=12089 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/130/bus" dev="sda1" ino=16211 res=1 13:07:44 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xf7ffffff) 13:07:44 executing program 2 (fault-call:4 fault-nth:14): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:07:44 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6010, 0x1) 13:07:44 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6011, 0x1) [ 279.125980][ T29] audit: type=1804 audit(1595941664.180:131): pid=12154 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/131/bus" dev="sda1" ino=16214 res=1 [ 279.206837][T12157] FAULT_INJECTION: forcing a failure. [ 279.206837][T12157] name failslab, interval 1, probability 0, space 0, times 0 [ 279.231158][ T29] audit: type=1804 audit(1595941664.280:132): pid=12154 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/131/bus" dev="sda1" ino=16214 res=1 [ 279.236561][T12157] CPU: 0 PID: 12157 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 279.263161][T12157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.273325][T12157] Call Trace: [ 279.276647][T12157] dump_stack+0x1f0/0x31e [ 279.281474][T12157] should_fail+0x38a/0x4e0 [ 279.286032][T12157] ? mempool_alloc_slab+0x49/0x70 [ 279.291882][T12157] should_failslab+0x5/0x20 [ 279.296644][T12157] kmem_cache_alloc+0x53/0x2d0 [ 279.301530][T12157] mempool_alloc_slab+0x49/0x70 [ 279.306548][T12157] ? mempool_free+0x380/0x380 [ 279.311261][T12157] mempool_alloc+0xf1/0x5a0 [ 279.315802][T12157] bio_alloc_bioset+0x1b6/0x5e0 [ 279.320900][T12157] ? __ext4_get_inode_loc+0x430/0xe20 [ 279.326312][T12157] submit_bh_wbc+0x1c7/0x6d0 [ 279.331555][T12157] __sync_dirty_buffer+0x19b/0x2d0 [ 279.336887][T12157] ext4_write_inode+0x34f/0x590 [ 279.341942][T12157] __writeback_single_inode+0x568/0x630 [ 279.349093][T12157] writeback_single_inode+0x1b1/0x7d0 [ 279.355789][T12157] ? sync_mapping_buffers+0x5b0/0xde0 [ 279.361387][T12157] ? __filemap_fdatawrite_range+0x2b0/0x350 [ 279.367310][T12157] sync_inode_metadata+0x6d/0xb0 [ 279.372279][T12157] ext4_sync_file+0x498/0x7f0 [ 279.378314][T12157] ext4_buffered_write_iter+0x52e/0x5d0 [ 279.384076][T12157] ext4_file_write_iter+0x88d/0x1930 [ 279.389984][T12157] ? lock_acquire+0x160/0x720 [ 279.394933][T12157] ? lock_is_held_type+0x87/0xe0 [ 279.400302][T12157] ? iov_iter_init+0x83/0x160 [ 279.405106][T12157] vfs_write+0xa08/0xc70 [ 279.409678][T12157] ksys_write+0x11b/0x220 [ 279.414153][T12157] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.420539][T12157] do_syscall_64+0x73/0xe0 [ 279.425721][T12157] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.432125][T12157] RIP: 0033:0x45c369 [ 279.436136][T12157] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.457612][T12157] RSP: 002b:00007f487a0a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 279.466543][T12157] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 279.474525][T12157] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 279.482686][T12157] RBP: 00007f487a0a0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 279.490888][T12157] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e [ 279.500015][T12157] R13: 00007ffc2382efcf R14: 00007f487a0a19c0 R15: 000000000078bf0c 13:07:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:44 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6012, 0x1) 13:07:44 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xfeffffff) 13:07:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:44 executing program 2 (fault-call:4 fault-nth:15): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:07:44 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6013, 0x1) [ 279.616941][ T29] audit: type=1804 audit(1595941664.670:133): pid=12170 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/132/bus" dev="sda1" ino=15810 res=1 13:07:44 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6025, 0x1) [ 279.663501][T12175] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 279.690440][ T29] audit: type=1804 audit(1595941664.710:134): pid=12170 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/132/bus" dev="sda1" ino=15810 res=1 [ 279.742134][T12175] 8021q: adding VLAN 0 to HW filter on device bond36 [ 279.750532][T12212] FAULT_INJECTION: forcing a failure. [ 279.750532][T12212] name failslab, interval 1, probability 0, space 0, times 0 [ 279.770262][T12212] CPU: 0 PID: 12212 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 279.779437][T12212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.790745][T12212] Call Trace: [ 279.794322][T12212] dump_stack+0x1f0/0x31e [ 279.798773][T12212] should_fail+0x38a/0x4e0 [ 279.803223][T12212] ? mempool_alloc_slab+0x49/0x70 [ 279.808595][T12212] should_failslab+0x5/0x20 [ 279.813241][T12212] kmem_cache_alloc+0x53/0x2d0 [ 279.818211][T12212] mempool_alloc_slab+0x49/0x70 [ 279.830557][T12212] ? mempool_free+0x380/0x380 [ 279.836417][T12212] mempool_alloc+0xf1/0x5a0 [ 279.841568][T12212] bio_alloc_bioset+0x1b6/0x5e0 [ 279.846941][T12212] ? __ext4_get_inode_loc+0x430/0xe20 [ 279.852992][T12212] submit_bh_wbc+0x1c7/0x6d0 [ 279.858122][T12212] __sync_dirty_buffer+0x19b/0x2d0 [ 279.864436][T12212] ext4_write_inode+0x34f/0x590 [ 279.869605][T12212] __writeback_single_inode+0x568/0x630 [ 279.875484][T12212] writeback_single_inode+0x1b1/0x7d0 [ 279.881313][T12212] ? sync_mapping_buffers+0x5b0/0xde0 [ 279.887030][T12212] ? __filemap_fdatawrite_range+0x2b0/0x350 [ 279.892956][T12212] sync_inode_metadata+0x6d/0xb0 [ 279.898164][T12212] ext4_sync_file+0x498/0x7f0 [ 279.902886][T12212] ext4_buffered_write_iter+0x52e/0x5d0 [ 279.909850][T12212] ext4_file_write_iter+0x88d/0x1930 [ 279.915356][T12212] ? lock_acquire+0x160/0x720 [ 279.920239][T12212] ? lock_is_held_type+0x87/0xe0 [ 279.925359][T12212] ? iov_iter_init+0x83/0x160 [ 279.930307][T12212] vfs_write+0xa08/0xc70 [ 279.934903][T12212] ksys_write+0x11b/0x220 [ 279.939250][T12212] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.945339][T12212] do_syscall_64+0x73/0xe0 [ 279.949787][T12212] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.955701][T12212] RIP: 0033:0x45c369 [ 279.959612][T12212] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.981263][T12212] RSP: 002b:00007f487a07fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 279.990175][T12212] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 279.998425][T12212] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 280.006500][T12212] RBP: 00007f487a07fca0 R08: 0000000000000000 R09: 0000000000000000 [ 280.014571][T12212] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f [ 280.022787][T12212] R13: 00007ffc2382efcf R14: 00007f487a0809c0 R15: 000000000078bfac 13:07:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:45 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xff0f0000) 13:07:45 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6048, 0x1) 13:07:45 executing program 2 (fault-call:4 fault-nth:16): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) [ 280.139107][ T29] audit: type=1804 audit(1595941665.190:135): pid=12232 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/133/bus" dev="sda1" ino=16198 res=1 13:07:45 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x604c, 0x1) [ 280.256829][T12241] FAULT_INJECTION: forcing a failure. [ 280.256829][T12241] name failslab, interval 1, probability 0, space 0, times 0 [ 280.270711][T12241] CPU: 0 PID: 12241 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 280.279495][T12241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.289656][T12241] Call Trace: [ 280.293180][T12241] dump_stack+0x1f0/0x31e [ 280.297742][T12241] should_fail+0x38a/0x4e0 [ 280.302425][T12241] ? mempool_alloc_slab+0x49/0x70 [ 280.307464][T12241] should_failslab+0x5/0x20 [ 280.312595][T12241] kmem_cache_alloc+0x53/0x2d0 [ 280.317471][T12241] mempool_alloc_slab+0x49/0x70 [ 280.322416][T12241] ? mempool_free+0x380/0x380 [ 280.327112][T12241] mempool_alloc+0xf1/0x5a0 [ 280.331639][T12241] bio_alloc_bioset+0x1b6/0x5e0 [ 280.336680][T12241] ? trace_lock_release+0x137/0x1a0 [ 280.341897][T12241] submit_bh_wbc+0x1c7/0x6d0 [ 280.346583][T12241] ? do_raw_spin_unlock+0x134/0x8d0 [ 280.352093][T12241] sync_mapping_buffers+0x4eb/0xde0 [ 280.357509][T12241] ext4_sync_file+0x609/0x7f0 [ 280.362548][T12241] ext4_buffered_write_iter+0x52e/0x5d0 [ 280.368148][T12241] ext4_file_write_iter+0x88d/0x1930 [ 280.373603][T12241] ? lock_acquire+0x160/0x720 [ 280.378401][T12241] ? lock_is_held_type+0x87/0xe0 [ 280.383513][T12241] ? iov_iter_init+0x83/0x160 [ 280.388418][T12241] vfs_write+0xa08/0xc70 [ 280.392696][T12241] ksys_write+0x11b/0x220 [ 280.397319][T12241] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 280.403504][T12241] do_syscall_64+0x73/0xe0 [ 280.408195][T12241] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 280.414198][T12241] RIP: 0033:0x45c369 [ 280.418272][T12241] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.438147][T12241] RSP: 002b:00007f487a07fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 280.446863][T12241] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 280.455137][T12241] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 280.463123][T12241] RBP: 00007f487a07fca0 R08: 0000000000000000 R09: 0000000000000000 [ 280.471527][T12241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 280.479513][T12241] R13: 00007ffc2382efcf R14: 00007f487a0809c0 R15: 000000000078bfac 13:07:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:45 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x605c, 0x1) 13:07:45 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xffffffea) [ 280.511391][ T29] audit: type=1804 audit(1595941665.560:136): pid=12232 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/133/bus" dev="sda1" ino=16198 res=1 13:07:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:45 executing program 2 (fault-call:4 fault-nth:17): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:07:45 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6068, 0x1) 13:07:45 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xffffffef) [ 280.701288][T12263] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 280.718303][T12261] FAULT_INJECTION: forcing a failure. [ 280.718303][T12261] name failslab, interval 1, probability 0, space 0, times 0 [ 280.802959][T12261] CPU: 1 PID: 12261 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 280.811670][T12261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.821737][T12261] Call Trace: [ 280.823746][T12263] 8021q: adding VLAN 0 to HW filter on device bond37 [ 280.825020][T12261] dump_stack+0x1f0/0x31e [ 280.825037][T12261] should_fail+0x38a/0x4e0 [ 280.825054][T12261] ? mempool_alloc_slab+0x49/0x70 [ 280.825066][T12261] should_failslab+0x5/0x20 [ 280.825078][T12261] kmem_cache_alloc+0x53/0x2d0 [ 280.825094][T12261] mempool_alloc_slab+0x49/0x70 [ 280.825108][T12261] ? mempool_free+0x380/0x380 [ 280.864969][T12261] mempool_alloc+0xf1/0x5a0 [ 280.869509][T12261] ? trace_lock_release+0x137/0x1a0 [ 280.874700][T12261] bio_alloc_bioset+0x1b6/0x5e0 [ 280.879545][T12261] ? rcu_lock_release+0x5/0x20 [ 280.884304][T12261] blkdev_issue_flush+0x32/0x200 [ 280.889248][T12261] ext4_sync_file+0x762/0x7f0 [ 280.893938][T12261] ext4_buffered_write_iter+0x52e/0x5d0 [ 280.899487][T12261] ext4_file_write_iter+0x88d/0x1930 [ 280.904790][T12261] ? lock_acquire+0x160/0x720 [ 280.909483][T12261] ? lock_is_held_type+0x87/0xe0 [ 280.914413][T12261] ? iov_iter_init+0x83/0x160 [ 280.919081][T12261] vfs_write+0xa08/0xc70 [ 280.923330][T12261] ksys_write+0x11b/0x220 [ 280.927650][T12261] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 280.933704][T12261] do_syscall_64+0x73/0xe0 [ 280.938151][T12261] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 280.944035][T12261] RIP: 0033:0x45c369 [ 280.947919][T12261] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.968235][T12261] RSP: 002b:00007f487a0a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 280.976642][T12261] RAX: ffffffffffffffda RBX: 00000000000362c0 RCX: 000000000045c369 [ 280.984604][T12261] RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000003 [ 280.992584][T12261] RBP: 00007f487a0a0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 281.000553][T12261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000011 [ 281.008536][T12261] R13: 00007ffc2382efcf R14: 00007f487a0a19c0 R15: 000000000078bf0c 13:07:46 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:46 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x606c, 0x1) 13:07:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:46 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6074, 0x1) 13:07:46 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x607a, 0x1) 13:07:46 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x60a1, 0x1) 13:07:46 executing program 2 (fault-call:4 fault-nth:18): r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:07:46 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0xffff8000, 0x1) 13:07:46 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:46 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xfffffff7) 13:07:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:46 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0xffffa000, 0x1) 13:07:47 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0x0, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:47 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:07:47 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0xffffc000, 0x1) 13:07:47 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xfffffffe) 13:07:47 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:47 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:47 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x3) 13:07:47 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x1) 13:07:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xd00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:47 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x10000000000) 13:07:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 282.357573][T12396] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 282.450156][T12396] 8021q: adding VLAN 0 to HW filter on device bond38 13:07:48 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0x0, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:48 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x4) 13:07:48 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xffffffff000) 13:07:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:48 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000000c0)={0x9b0000, 0x8e6, 0x80000001, r3, 0x0, &(0x7f0000000080)={0x980926, 0x0, [], @string=&(0x7f0000000000)=0x3b}}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x40) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r3, 0xfffffffffffffe0d, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000600)={r6}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r5, r3, 0x0, 0x1, &(0x7f0000000200)='\x00', r6}, 0x30) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000700)=ANY=[@ANYBLOB="f2ea56687f9bd6b2575f421c91c739ca041eed7eb8f5317a2e5c20ad056f43107a8caa20f9c15aeb3b092a1164e6af3b69fc99091955cd82a83aff2b237128487eedf78dedacaa6d1cb5fec5886e3e42580d9492819bb9b2c3b547659ffc5286434ce90619cf99c397730d88015b76038892f83b0000fc2037a3a01c4e75cf4adb6fbb1cbfdc429805c7b63a96c1b576c776f61c79616561679cbba6b0052c0d6b22c0e802008bcf2b121468a255414fc7d41c0febebbfa7e4e01eabd6ca990d8deee667c3d2e60898230bfc097ae7e4dad54857d01cb0032d39bb7a4a23c00c715d33b5719f6bdfae7ef0adf6665ea9ad4eafdaeb8de997", @ANYRES16=0x0, @ANYBLOB="000426bd7000ffdbdf250800000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x14) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x100, 0x0) [ 283.010057][T12444] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 283.024390][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 283.024399][ T29] audit: type=1804 audit(1595941668.080:147): pid=12445 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/139/bus" dev="sda1" ino=16268 res=1 [ 283.051038][T12444] bond39 (uninitialized): Released all slaves 13:07:48 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x777f7fb6cfff) 13:07:48 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x5) 13:07:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:48 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2040, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IMGETCOUNT(r4, 0x80044943, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_GET_LEASE(r2, 0xc01064c8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0/file0\x00'}, 0x6e) [ 283.247283][ T29] audit: type=1804 audit(1595941668.140:148): pid=12445 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/139/bus" dev="sda1" ino=16268 res=1 13:07:48 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x20000000000000) [ 283.321143][T12469] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 283.357429][ T29] audit: type=1804 audit(1595941668.350:149): pid=12467 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/140/bus" dev="sda1" ino=16254 res=1 [ 283.395077][T12469] bond39 (uninitialized): Released all slaves [ 283.503971][ T29] audit: type=1804 audit(1595941668.350:150): pid=12465 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/140/bus" dev="sda1" ino=16254 res=1 [ 283.628624][ T29] audit: type=1804 audit(1595941668.480:151): pid=12479 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/141/bus" dev="sda1" ino=16271 res=1 [ 283.697588][ T29] audit: type=1804 audit(1595941668.530:152): pid=12479 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/141/bus" dev="sda1" ino=16271 res=1 13:07:48 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0x0, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:48 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1) 13:07:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:48 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x6) 13:07:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x1100, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:48 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x30000000000000) [ 283.934582][T12501] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:07:49 executing program 0: mknod$loop(&(0x7f0000000000)='./file1\x00', 0x20, 0x1) [ 283.963331][ T29] audit: type=1804 audit(1595941669.020:153): pid=12503 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/142/bus" dev="sda1" ino=16275 res=1 [ 284.061434][T12501] 8021q: adding VLAN 0 to HW filter on device bond39 13:07:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x1200, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:49 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x7) [ 284.136188][ T29] audit: type=1804 audit(1595941669.190:154): pid=12503 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/142/bus" dev="sda1" ino=16275 res=1 13:07:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:49 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xf0ffffff0f0000) 13:07:49 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0)='devlink\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SPLIT(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, r4, 0x800, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x2040000}, 0x40000) r5 = socket$inet6(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) sendmmsg$sock(r8, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$FS_IOC_FSSETXATTR(r8, 0x401c5820, &(0x7f0000000340)={0x0, 0x9, 0x7, 0x5f8d, 0x80000000}) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="0f00000000000000005a28fd1fd625630ab923f00d29001100000008000300", @ANYRES32=r6, @ANYBLOB="0600280000000000"], 0x24}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r10, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000005}, 0x20004801) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) [ 284.288905][ T29] audit: type=1804 audit(1595941669.340:155): pid=12561 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/143/bus" dev="sda1" ino=16264 res=1 [ 284.305674][T12560] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 284.405609][ T29] audit: type=1804 audit(1595941669.340:156): pid=12561 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/143/bus" dev="sda1" ino=16264 res=1 [ 284.411256][T12560] 8021q: adding VLAN 0 to HW filter on device bond40 13:07:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, 0x0, 0x0) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:49 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r4 = accept4(r3, &(0x7f0000000180)=@qipcrtr, &(0x7f0000000200)=0x80, 0x1800) sendto$x25(r4, &(0x7f0000000240)="dc447003589729c7de153c9d9326f55c2958c8b132b8ee1d3471474ae8ed5f1529bee3bf1b94481ff34e54e3d9ddc5db570c44", 0x33, 0x80d0, &(0x7f00000002c0)={0x9, @null=' \x00'}, 0x12) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000100)={0x2, 0x4, 0x800, 0x0, 0xd}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000080)="e08947dbd8ea9a135da3c02699316b6ba9349321e4a2ab5f426e427dc455d4d6d75e7dcb347137eac29c15863c610f04ff6ecc52aee8f30988d2009c84f2cf9a5ba37414a0923f7ad83bab8d752a0bdb7ab302a51873f20aee1c5d848f709d4eebf2a38bb776a47d6cf17a1a"}, 0x20) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) inotify_init1(0x80000) 13:07:49 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x100000000000000) 13:07:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:49 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x8) 13:07:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:49 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x9) [ 284.890243][T12625] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:07:50 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat2(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x20280, 0x4, 0x8}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) ioctl$FICLONERANGE(r7, 0x4020940d, &(0x7f0000000240)={{r3}, 0x0, 0x100000001, 0x40000000000000}) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r6, 0x100, 0x0, 0x0, {{}, {0x0, 0x4102}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0xa, 'ipvlan1\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r6, 0x200, 0x70bd28, 0x25dfdbfc, {{}, {}, {0x8, 0x11, 0x6309}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x240040d1}, 0x40840) read$rfkill(r1, &(0x7f0000000000), 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x2000, 0x0) [ 284.979560][T12625] 8021q: adding VLAN 0 to HW filter on device bond41 13:07:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0xe0) 13:07:50 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x200000000000000) [ 285.233750][T12685] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 285.267317][T12685] bond42 (uninitialized): Released all slaves 13:07:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, 0x0, 0x0) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) write$FUSE_GETXATTR(r1, &(0x7f0000000080)={0x18, 0x0, 0x4, {0x4}}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r5 = fcntl$dupfd(r2, 0x406, r4) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'gretap0\x00', {}, 0x7}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x100, 0x1) 13:07:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:50 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x2000000000000000) 13:07:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x1001) 13:07:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 285.753578][T12706] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 285.780761][T12706] bond42 (uninitialized): Released all slaves 13:07:50 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1f, 0x280000) quotactl(0x4, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)="e57c8f9667795d155c758f04acd170355b505e9e0737605cea717637d9d5ea2aa349c2e3de62ee520f5569b0c1656653d0910e06783de1895d526499aa758bc26012fc7dceb9eb77bb791908395df6f9e81812daddb1062ed926ba74bdc052edcfdbd3c6fb9b6a842b290c0e5cc565d5172a22e4d837914391") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='environ\x00') io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000340)=""/181, 0xb5}, {&(0x7f0000000400)=""/158, 0x9e}, {&(0x7f00000004c0)=""/182, 0xb6}, {&(0x7f0000000580)=""/81, 0x51}, {&(0x7f0000000600)=""/159, 0x9f}], 0x5) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000180)={@in6={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xb46}, {&(0x7f0000000080)=""/182, 0xb6}, &(0x7f0000000140), 0x22}, 0xa0) 13:07:50 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x3f00000000000000) 13:07:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0xfdef) 13:07:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2500, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 285.991853][T12729] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 286.036695][T12729] bond42 (uninitialized): Released all slaves 13:07:51 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0xffe0) 13:07:51 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, 0x0, 0x0) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:51 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:51 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xeaffffff00000000) 13:07:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2c00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:51 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x8800000) 13:07:51 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x8, 0x1) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x8002c0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cachefiles\x00', 0x440800, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto$ax25(r5, &(0x7f0000000400)="829583140e5532e45ca2daa8d66e5cd641539d4b2ec542312c6365846b38686e8791c76574c4dd38a6dccc7c09eb12e927d909506381b7b03764f221503b68fc491428800e0d12571e44199691c4ed5878d49d71319222ebb045a31ad816f2054244c64e71dfada987106d5a20a328dc38a37aa0e2a54cdaf6bbc099082506e3facf138c39b79b4d09", 0x89, 0x800, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x20, r3, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7f}]}, 0x20}, 0x1, 0x0, 0x0, 0x4081}, 0x2002005c) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r3, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x100}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0xd9637891e906b658}, 0x41) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)="894985061966186de13225faace3eeb27b813a389b8d05c4a7ee50bb86c7b222bb9be4c873db5ba6a1564b3ef8db3f1f562bc6196bdc3fb01edd4911316f48a048a95dc49367df02caccdb437d23efc0845ebce271506ea95bbd1da8c26a288dce35e0e74452627b5f3af43bdac0c64d07f1c6", 0x73, r0}, 0x68) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000240), &(0x7f0000000280)=0xc) dup(r6) accept4(r6, &(0x7f0000000080)=@xdp, &(0x7f0000000000)=0x80, 0x100000) 13:07:51 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xefffffff00000000) 13:07:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2d00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:51 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:51 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r5) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x20028, &(0x7f00000000c0)={[{@xino_on='xino=on'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\'.'}}, {@fowner_gt={'fowner>', r1}}, {@pcr={'pcr', 0x3d, 0x36}}, {@fowner_gt={'fowner>', r3}}, {@obj_type={'obj_type', 0x3d, '/\v:}^'}}, {@uid_eq={'uid', 0x3d, r5}}, {@smackfshat={'smackfshat', 0x3d, '(%(!!'}}]}) 13:07:52 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:52 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xf7ffffff00000000) 13:07:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300), 0x0) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:52 executing program 0: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x80000, 0x0) 13:07:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x3500, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:52 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xfeffffff00000000) 13:07:52 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x20000102) 13:07:52 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x8000, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) sendmmsg$sock(r2, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) mmap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1, 0x13, r0, 0xf7e4b000) ioctl$BLKROSET(r5, 0x125d, &(0x7f0000000180)=0x8) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_PREPARE(r7, 0x4140, 0x0) bind$can_raw(r2, &(0x7f0000000300), 0x10) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x101, @mcast1}}}, 0x90) [ 287.613215][T12810] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 287.649660][T12810] bond42 (uninitialized): Released all slaves 13:07:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:52 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xff0f000000000000) 13:07:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:52 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x208100, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000080)="18f902d4765f4448bd94fb0c76ca26e4c58ea5bd576e720d86be69154f0da0d042801b7646b754e0c712afd63c27cfbb513cec749af1333e0ed717c52e85ab5c16dd5e517e7a70707d9bf9a54a045ecde3", 0x51) [ 287.880492][T12836] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:07:53 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) statx(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x100, &(0x7f0000000080)) [ 287.925624][T12836] bond42 (uninitialized): Released all slaves 13:07:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300), 0x0) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:53 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xffcfb67f7f770000) 13:07:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:53 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x46, 0xc0000) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000100)) r2 = dup(r0) sendmmsg$sock(r2, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) 13:07:53 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x7ffff000) [ 288.379233][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 288.379242][ T29] audit: type=1800 audit(1595941673.430:176): pid=12813 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16286 res=0 [ 288.510175][ T29] audit: type=1804 audit(1595941673.560:177): pid=12862 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/153/bus" dev="sda1" ino=16287 res=1 [ 288.513443][T12861] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 288.550194][T12861] bond42 (uninitialized): Released all slaves 13:07:53 executing program 0: mknod$loop(&(0x7f0000000040)='.\x00', 0x800, 0x1) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={0x3, 0x1f, "cb62b8", 0x1, 0x2}) 13:07:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x5c00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 288.621744][ T29] audit: type=1804 audit(1595941673.630:178): pid=12862 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/153/bus" dev="sda1" ino=16287 res=1 13:07:53 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xffffffff00000000) [ 288.760399][T12884] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 288.799623][T12884] bond42 (uninitialized): Released all slaves 13:07:53 executing program 0: mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0x6000, 0x1) [ 288.806582][ T29] audit: type=1804 audit(1595941673.870:179): pid=12889 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/154/bus" dev="sda1" ino=16286 res=1 13:07:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x6401, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 288.932348][ T29] audit: type=1804 audit(1595941673.920:180): pid=12889 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/154/bus" dev="sda1" ino=16286 res=1 13:07:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300), 0x0) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:54 executing program 0: chmod(&(0x7f0000000000)='./file0\x00', 0x10c) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000b40)) r0 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000080)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x10, 0x46d, 0xc283, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x6, 0xe0, 0xfa, [{{0x9, 0x4, 0x0, 0x7, 0x2, 0x3, 0x1, 0x1, 0x81, {0x9, 0x21, 0x101, 0x1, 0x1, {0x22, 0x15e}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0x9, 0x7f, 0x7f}}, [{{0x9, 0x5, 0x2, 0x3, 0x400, 0x7f, 0x39, 0x6}}]}}}]}}]}}, &(0x7f0000000640)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x201, 0x3, 0x51, 0x9, 0x20, 0x11}, 0x5, &(0x7f0000000100)={0x5, 0xf, 0x5}, 0x8, [{0xe2, &(0x7f0000000140)=@string={0xe2, 0x3, "db2cef629fff8d057103805d30988ec2a2c75cf3f46cbb6a80cbe6e04754f3a3130a0ad71c76134c3cf6d7c3c08582009e8486a0b0c1f4325e8c87369600a811d50cdb07493c6d3fdef81130638c188c25ac66abaa693c5003eeb35b754642867ff15aec4d690e2ca02d49af5016fadc5351ca0f5a2f475ad037b501d9d56444d2a11fd32e12a51f5f2b4e7722a17f4a3268c802260641900288c0bb1de456c26a892dded49475447be3df013e829c8b3860e6a4758ad46994dbbaafc383965508ab6a43d9e1801b2e3cee7c0d64f263709a3a3a92e24dfb0e06f91d06bdc367"}}, {0x28, &(0x7f0000000240)=@string={0x28, 0x3, "1894c15fd0810256028756f83eee85c96fad5690387594879269e77114b147072a9401ec29ce"}}, {0x24, &(0x7f0000000280)=@string={0x24, 0x3, "510d470835d93c3a1acb203788d0be7e48e66a9c2125cf5494ca836af8dfa8821bd7"}}, {0x71, &(0x7f00000002c0)=@string={0x71, 0x3, "f1a772d1c78467b1758f35d0db63bc29c73bb9ca4ece62074d226547783227209c5c93f068a7993f46209288c14f6a4cc2b82a3f1f7e56f675c3919e9905eb6d220d67d6f0201b79b30dd5a87d3c3ae200ca670f0bf9035977a1ea8e38a55e14ae0368a99b426147243f8b20708801"}}, {0x102, &(0x7f0000000340)=@string={0x102, 0x3, "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"}}, {0x65, &(0x7f0000000480)=@string={0x65, 0x3, "d0a536cbd9c452d7141467a345a0c2f690b7454fa2a1f6e9d3f80aa1228bc2fb998843e2e2ca6b2cb7638960515836bdea90f4eb8c3c2ee67279044ef61262f9ac493c45352a719979c1dd1ed38536b04b4fa8f1f79811f42dc91c9b0641a292b51b9a"}}, {0xf3, &(0x7f0000000500)=@string={0xf3, 0x3, "37cbcf00c82daf0ff83eeb8f0a6bc26fc11ed2db5c340f5a5eeaf03b99028ea06084210afcd30fd6eacf94db9eba72313569c6f6ec0881b1f00a96ec282654f90abb84829c5e99c29927bed86ec26d4365b1a27a9ec1d199f0c119fcc0b3fa485dbf147af1bfb4a4c97819a7a2fe5f6897110904651cf515e061a25f837b0bdf1beaadaffe2718aa4d0870d91567f9a8fb57a16d0714f03794caf423fe94affa86967d3fa567a00dff5967853525870a015333e6f93c1586882f504b3b0fc40451a9e92abc9b3ed0d14205801cc5cb3694c76e8363abcfd7a778c89949a1eb324e1b1546af3e36a285cdb9c5470850d2a5"}}, {0x2b, &(0x7f0000000600)=@string={0x2b, 0x3, "2593094c893cbb403ec04f7ed4ad80ae895fc63dce1d525b105b9ebe46c2f3b2762130b5b9829f91b2"}}]}) syz_usb_control_io$hid(r0, &(0x7f00000008c0)={0x24, &(0x7f00000006c0)={0x20, 0x22, 0x101, {0x101, 0x22, "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"}}, &(0x7f0000000800)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x801}}, &(0x7f0000000840)={0x0, 0x22, 0x1c, {[@local=@item_012={0x1, 0x2, 0x4, "df"}, @global=@item_4={0x3, 0x1, 0x9, "682df3ac"}, @global=@item_4={0x3, 0x1, 0x2, "bfb930e7"}, @main=@item_012={0x0, 0x0, 0x8}, @local=@item_4={0x3, 0x2, 0x6, "d411d01e"}, @main=@item_4={0x3, 0x0, 0xb, "4950b261"}, @global=@item_4={0x3, 0x1, 0x0, "91b1d0be"}]}}, &(0x7f0000000880)={0x0, 0x21, 0x9, {0x9, 0x21, 0x1, 0x3, 0x1, {0x22, 0x1ff}}}}, &(0x7f0000000b00)={0x2c, &(0x7f0000000900)={0x40, 0x18, 0x20, "2b6258711fdd74840eebf2a83d29a61327a42d7894ef728a25b2123ec44e0926"}, &(0x7f0000000940)={0x0, 0xa, 0x1, 0xf5}, &(0x7f0000000980)={0x0, 0x8, 0x1, 0x6}, &(0x7f00000009c0)={0x20, 0x1, 0xf2, "d520b1abab3102b02a9f748f15af6e1e49bc4fd15ce11b28c427cda441aaaa60af41cdb911a4e1b719f34443f0a3c8e59b9ad73ba2b57bbca184db9277147b65ed8b3c75b3f51c8f2dab8243eb0117d97abfeae7aa00c6407c46eaa8adf8a2f193970b565360701412dad992fb46fc2c0a85b46a8e7a5ab0f915aea1350e9f4fa05f51daf1385e7877aa3b7bbeace35a65d87eedc82e1af830cf022a90c57860841af042c3aeb3ce7ebee83c8b64a251826909b5fe26f12b9d5d382eee67777b9a0d1febc317ff9d0d6f7434ad687c940789756baa50483d38c18fb254053981a430e7c32c63c0e50d0f15d39cabc59926e3"}, &(0x7f0000000ac0)={0x20, 0x3, 0x1, 0xff}}) 13:07:54 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0xffffffffffffffff) 13:07:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xc601, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 289.411342][ T29] audit: type=1804 audit(1595941674.460:181): pid=12914 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/155/bus" dev="sda1" ino=16290 res=1 13:07:54 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0xfffffdef) 13:07:54 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x1c4) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 289.480245][T12924] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 289.500759][T12924] bond42 (uninitialized): Released all slaves 13:07:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 289.532302][ T29] audit: type=1804 audit(1595941674.460:182): pid=12914 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/155/bus" dev="sda1" ino=16290 res=1 13:07:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 289.640986][ T29] audit: type=1800 audit(1595941674.530:183): pid=12876 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16259 res=0 [ 289.732997][ T9074] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 289.742486][T12938] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 289.769222][T12938] bond42 (uninitialized): Released all slaves 13:07:54 executing program 1: r0 = creat(&(0x7f0000000200)='./bus\x00', 0xaa) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x42) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = dup(0xffffffffffffffff) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) sendmmsg$sock(r6, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) sendmmsg$sock(r4, &(0x7f00000022c0)=[{{&(0x7f0000000340)=@can, 0x80, &(0x7f00000001c0)=[{&(0x7f00000003c0)="eae6e1674904e2956d15f7836ee23f44b17076aff6b46d7a43332e8ce86dcf6dfcec843f002da3da79aea159ca35d12a2fabdfc8414423aff5495fb0e7c7d484cae76bfbd0a1a15fcd5abead3228150b24eaf84f2d97027101e3453f9c259cc78c94d1b00c1ec1b1b20beeea7b217cd0896c3ed17be02d74d1495463d443fdd5afdddc9726f0b51b1cdc628bc0b79830b02e2c2c53a7bfe2674dadb31720a29d1d7de01be578d9d6e5291e41cb31395ca5d702ff4286d321e522bf", 0xbb}], 0x1, &(0x7f0000000480)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x401}}], 0x30}}, {{&(0x7f0000000500)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null]}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000680)="e331724e6bdb5c802efc2278b0f8d7cdfd026a2cf8ceb649e0dbe3893c6f03b3501febd71e75c7a7582e72bd1dfaa5f333479a41e1fe8235542672aad5768927158a5f56dd7c3cf5a31cdebc2d240482cab738525e135a5e8df546be6d5a57ed21074cfa286fa6c9c7759687bbb5117a34488f9637bbb91d77e8dd64049fe2eef75a8e0dc4db65508ce156908530fbe02063b67c7223c98e3020b593d4407af738ad61a2422472b684b506c964f86d", 0xaf}], 0x1, &(0x7f0000000600)=[@timestamping={{0x14, 0x1, 0x25, 0xf7}}], 0x18}}, {{&(0x7f0000000740)=@ax25={{0x3, @null, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80, &(0x7f0000000f80)=[{&(0x7f00000007c0)="e6c572026cf9766901f54c0ffa84a030be6d3854350a5f166bb401da3a3429eb3cdc88744b50708dbbbc6388ef1a077bd8fc492efec8aa3f280927202c02e72d28206d46ab5a5d995ebed8dd71503c5eec7ef616ede98a74bf3880275c08bcb840ed4c869c239762941174f0c0ae780c739830ec0e528a7acf7bfeeab471a694ab6ea09797ea08cf7d8fb2e316109faeb5e06cf22629490846a80bee2e617273885e358b8e0a2a9750bee6b805452d702697ba1b0bf1", 0xb6}, {&(0x7f00000009c0)="5bf347134dc508082b0590f8ea4f65cd0a500f9545b467ed3e25691444bb074e7b0294cd9e12c61416510fc46f96218214a4b474ce5f1ef334b9dbbc463933d24b27a52ef345fff43b23d6ae4db28454b100bd9992e834e45b97bb57cfceb919ded1e336ea39bb4c9ad0c415eca290c69ae02e2de1f40c5289893c8c6cf30eaa389d7f6d67f3de60021a8bf9300107e5ff0b2762b2d609134be00a59f8948ecccbf5246a093c0b686383bece631c5f2b02e8", 0xb2}, {&(0x7f0000000880)="42177a9779c17344453f0ca18c48b7e3f3a83c0fb3b6b523723a5e00ee4d558fcd27c3a790194890c2d5cd80f9dfdce4c6e98f91c4f62f952dfd586693e20ca32919ccb6d1f2a988b01dca9859279a04c763c44d0a65f0827a13223dbb4a248f89baac2509c2be1cefd22f8543a26da99f13f4e384e4", 0x76}, {&(0x7f0000000a80)="a82956c8fcbd3c44db8d8aadd8cb7a801155caa43beb2f877c95db111edf5b28282b2dda35690a58968bd592b45bde4992a4b8687d2fbc5c776504102b8f974ac5f1c64074265b5df04001a199280e5aab108f155e60b4d3b6c34b0090d999a277a9ba95dfb84e9a7e4f2bc17ec25b08e37e355bcd94b569bccf854e4c03cf62968318dbefa80a3afa79a0b8b8c92d7988132cdc235a84627ff3030b", 0x9c}, {&(0x7f0000000b40)="d100fc6f297c63be5fcca4863db17e5f639a4386201a503dbdf64730ee3c73a5292094a65d6a2f1943b26786a8b2dfb90aec36d98defebc95b6a06183c6e1640eb442f3f881ad612103afbf43918b77afd4a8f21276fbbcb2434294dbda0acc6eb6d62e2685ab30d5755f361d6ab0e2177e3513445f65e2fb0cd3ac3153be3f511d1d03b83aa8019a0ae144ff61d0fcb69db831e74ed822f1261c191668a9fab43179df5c7fdc3e42449b58b6e256f4b9f9941f45b0e123821720691106609bf30dcc0b544892dbfd2c6ea7d26bcd613cd74c2d160c4d3fd4e8eba730170cc74e05d947f", 0xe4}, {&(0x7f0000000c40)="7dea4d186640a61bd1887b7555fc11dae2c687954965cda56bbe3f22f45b09054e90b5087d3f973105f37c3999ee97e4569cc0cfbf1136e18066489a4ead83cd2647d041273a48350834f6ec89cac7746c25ab16ea447615fc1935ee1fffe866", 0x60}, {&(0x7f0000000cc0)="017fdab0b25c80f7e5bb8840fecabb4d49afabee3c29b45b4b7d6e7dfe88f2e8dcb96605316f9cb9ed5cc1443f7af6e7e6b75705413b1fcf49e417529987487c830cb5bec39313dc692a631dae487d65fb1eb5e79f8adf8b183e69997d0beabf87cb5424a78f7e739de19735a763f7182d3a6f45940bf4c8f009f1184a5714affcb36adce089d185a764f02fb9b53b67a1fc9b0618ff3bf8a29d06cace2b93da644c285c4e16078515fcfd23b1bdf44f512992d03e66977a42b6c9226d37d2068836e38ddcff17cecf3852bbbdd8045400090d1931", 0xd5}, {&(0x7f0000000dc0)="37cf78a7e57ed5eceb913ed392ea63e57ef51c423837e3165590733e17979eb80ec77973d2ae669e4ccfa30da48f842d62cb42596cc9add4d80c44ec95845d7c660f38ebff5d975fd38761294ea0c4f7e16c98bfbabc7f3a19cbf5daaa5a90315f4ac7f15d822d5e6d8e6937bf4b2855a9d6d3031bf4f14e95c07accffafd7421bf2443a30bf83795935376d629cd46ead40ae2464a13f130c446b00", 0x9c}, {&(0x7f0000000e80)="e055053b4b43ffb9ea7903e67e670bee45fd35ff5047fb244e7212ee4dd1f25aa1c12a0e7149596350b79819abd181dabf17168a88f9e18d556ccad7c708912ea57adcfac007d507aadabf4e011cddffd86f9dc4db5b8fa9d898999dec4c0cdcd78413c1807a8f9fefd127c5e42dfe493f6d97934ba4340d8f5fec010a477247f76471ea7cbf2384fb7d96368f10a013130d0bd953559835fbe7b19d497962cfa621bdd448a7fd7eb65118a476f18801971555a61c419c1d661fe4bd43aab4e85e468fef66e5028cc06254132be2df517cba29123b5d822d4348b2057f33d8811774a8bf3a31fccaf3ce6f712d297fa6bdfea3324305eb0dcd28052474", 0xfd}], 0x9}}, {{&(0x7f0000001040)=@nfc_llcp={0x27, 0x0, 0x2, 0x6, 0x80, 0x3, "86db372a148899d79078a85b28d0b2e0e4cec3cc2548bdbac6be5f6f6c80b935b10df3fe80af0793e3a01420c0ef7f578605cb861112a124feee34e44a05e3", 0x2b}, 0x80, &(0x7f0000002240)=[{&(0x7f00000010c0)="a68c02757d761d92833c74437b35b6f640ec6d2ddee369f7ebdc73616277380f71dc87494f214ff75cf461949b39b473d6250f6775f6a71a56c9d62e468b", 0x3e}, {&(0x7f0000001100)="32cb3e794890319ede74799120ac517fbf5f32d54b6e2438668efc8c9a168808f85db8502d0d99665462d1289dc918e251d6922ac281976044349de4eac3217913ecc0a90eb706e3e2b7012b035b06b186fb0dcc368e31a09c4be054892e72145b0ed98c84db78692c92a3e7c34ef4f701b8ab350308a8fcf298542e0b08c772e2db840efd18a38ec9df0d69d5f5d061b827e9b6115f787c3d3f1895a6dae2560a1fbb34aca414a9d3fa1f598cc1da1254665ad0c15c55a1ddb7615d1fee057cfd0245bb1bfaadfbfffa4a879ec637d2c3db2d9254e70e802b860fbb442e", 0xde}, {&(0x7f00000002c0)="cac86cee1ef0837c940c90cd08f7b1fe0a57bf4f476fd0a7530267fb5b43058e7b3cb44f51e14ff6710020000400"/71, 0x47}, {&(0x7f0000001200)="9b71405e4d9573108352f58089f38db28ad535013758cfb88b852568b5b2a0f5f321", 0x22}, {&(0x7f0000001240)="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", 0x1000}], 0x5}}], 0x4, 0x400c840) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_GET_VCPU_EVENTS(r9, 0x8040ae9f, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="040b7500b78b40f0ccb1bc1cb4a9c77aa216cb0000010000000000704012c03f9eccfd", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:07:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfa03, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 289.778931][ T29] audit: type=1804 audit(1595941674.660:184): pid=12931 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/156/bus" dev="sda1" ino=16280 res=1 13:07:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 289.983841][ T29] audit: type=1804 audit(1595941674.670:185): pid=12931 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/156/bus" dev="sda1" ino=16280 res=1 [ 290.013791][ T9074] usb 1-1: Using ep0 maxpacket: 16 [ 290.085047][T12958] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 290.156486][T12958] 8021q: adding VLAN 0 to HW filter on device bond42 13:07:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db", 0x2) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfb03, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 290.222952][ T9074] usb 1-1: config 1 interface 0 altsetting 7 endpoint 0x2 has an invalid bInterval 127, changing to 10 [ 290.247253][ T9074] usb 1-1: config 1 interface 0 has no altsetting 0 [ 290.433126][ T9074] usb 1-1: New USB device found, idVendor=046d, idProduct=c283, bcdDevice= 0.40 [ 290.448478][ T9074] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 290.457538][ T9074] usb 1-1: Product: ൑ࡇ㨼쬚㜠킈纾鱪┡哏쪔檃芨휛 [ 290.467226][ T9074] usb 1-1: Manufacturer: 鐘忁臐嘂蜂즅굯遖甸螔榒燧넔݇鐪츩 [ 290.483750][ T9074] usb 1-1: SerialNumber: ꟱텲蓇녧轵퀵換⦼㯇쪹칎ݢ≍䝥㉸‧岜Ꝩ㾙⁆袒俁䱪룂㼪縟썵麑֙淫ഢ홧⃰礛ඳ꣕㱽쨀ཧ喇夃ꅷ軪ꔸᑞήꥨ䊛䝡㼤₋衰 [ 291.153040][ T9074] usbhid 1-1:1.0: can't add hid device: -71 [ 291.173466][ T9074] usbhid: probe of 1-1:1.0 failed with error -71 [ 291.181673][ T9074] usb 1-1: USB disconnect, device number 12 13:07:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:56 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYRES64=r1, @ANYRES32, @ANYBLOB="df06ec8898b036a4859cc65c294d28e0cc9efc091d"], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400202) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='0\x00', @ANYRESOCT], 0x2, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_uring_register$IORING_REGISTER_PROBE(r4, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e8000000000000000000000000000000000000000000000000000000000000000000000000000800"/200], 0x17) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)="be235fa0a0165da6420a271f382b45eb06158d83b03d0f00197160a70efbfa692e2432339508cc9832270e4c9435f5ba6998acdf8f1f5d30aa968156ae4e980f7cca3e8c71f6e9d5fd47562a7fd7ff84f7ff667e71594525908302d64d1d86f302a8a59a67211a944347bab57758cd0ea9653b252a4d70802a52bd1bc318428d76f9cc6619cd91af75ba41825cf51da2539670e6e8c63135b02cc127761c6c088309c0635b4c49b681bbb6639fae9deeb743229047373a2c1b5860d15ed55e55f44cd45536472e9fd562c9e4f5d1cb8a167b42", 0xd3}], 0x1}}], 0x3c, 0x40800) ioctl$LOOP_CLR_FD(r6, 0x4c01) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$inet_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) 13:07:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xff03, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:56 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0xffffffe0) 13:07:56 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db", 0x2) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:56 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="045b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:07:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:56 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000040)={0x8e9d, 0x0, [], {0x0, @bt={0xff, 0x1d, 0xfe5f84c92299a377, 0x2, 0xbbe, 0xa00000, 0x7, 0x1, 0xffffff51, 0x401, 0xffffffff, 0x1ff, 0x5750, 0xad, 0x8, 0x28, {0x7, 0x4}, 0x5, 0x7}}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x14, r3, 0x1, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0xa00000000000000}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x150, r3, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfff}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x33}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x800}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x407}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1ff}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xd48c}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xc}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4c}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6f}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x50}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x45005}, 0x800) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x6a80, 0x0) getsockopt$SO_J1939_PROMISC(r4, 0x6b, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x4) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) [ 291.581309][T13037] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 291.661509][T13037] 8021q: adding VLAN 0 to HW filter on device bond43 13:07:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x1fffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:56 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) epoll_create1(0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:07:56 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x400, 0x1) [ 291.858435][T13090] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 291.919189][T13090] 8021q: adding VLAN 0 to HW filter on device bond44 13:07:57 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000100)={0x2e}, 0x4) r3 = dup(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x8080, 0x0) sendmmsg$sock(r3, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000180), 0x1}}], 0x1, 0x40800) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000240)='htcp\x00', 0x1) r7 = dup(r6) sendmmsg$sock(r7, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$ION_IOC_ALLOC(r5, 0xc0184900, &(0x7f0000000140)={0x10001, 0x1f, 0x1, r7}) r8 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x7fffffff, 0x80000) copy_file_range(r3, &(0x7f0000000000)=0x6, r8, &(0x7f00000000c0)=0x6, 0x9, 0x0) 13:07:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 292.124855][T13136] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 292.293929][T13136] 8021q: adding VLAN 0 to HW filter on device bond45 13:07:57 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0xffffffff000) 13:07:57 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0x1, &(0x7f00000001c0)="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", &(0x7f0000000100)=@udp6=r3, 0x4}, 0x20) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0500", @ANYRESOCT], 0x2, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) sendmmsg$sock(r7, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) lseek(r7, 0x10000, 0x2) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:07:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:57 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db", 0x2) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:57 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000500)='mptcp_pm\x00') syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') sendmsg$MPTCP_PM_CMD_SET_LIMITS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8000000}]}, 0x69}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x6c, r3, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @dev={0xfe, 0x80, [], 0x12}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x23}}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x15, 0x2, 0x8, "42fb377da1f53beba6f6deb7427702c8"}, 0x15, 0x2) [ 292.671509][T13196] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:07:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 292.755918][T13196] 8021q: adding VLAN 0 to HW filter on device bond46 13:07:57 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1, 0x1) 13:07:57 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r4) sendto$rxrpc(r1, &(0x7f0000000300)="8c086ade0cae6958f9120fc967d8311d06d1ff085e5812143e1b04f8527caee1beabebe8f6a5bcc0a276d7b22b82a5fe7ebca74031386bf8c1c42767b74980fd4315a89af1255e389ac536244662b249c727f0dcdf7e8798ae75c515a40ac86c3c0943928a8e73f458f09164818a678cf81dd51e7fdcf5d66d2ccc27711dbd5fcd1d27a6d01a6f7f62d501f0184b7089fe38b973328b41", 0x97, 0x4, &(0x7f0000000080)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e21, @remote}}, 0x24) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC=r2, @ANYRESDEC=r3, @ANYRES32=r4, @ANYBLOB="95c06f51a804cbf0163239334064be4987ff70d21f579827a1eeddf7abd682ebf4835917f26bfdc999e8ef3a83419af70e9f02915e41fc617ebabbdb232443f765883237cac2c04e69e9ab4c34de7e479206439ff6a7d69c358b73ad5d38a31863565ec94ba242a31c3cf16f02a2b369310346ad21bb64398abe4f2bfb76e100a499bfa8203dc1eb74014cf3b16ea005a5018a00cb4bb4"], 0x1) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x7266, 0x3f, 0x3, 0x6}]}, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) pipe2(&(0x7f00000003c0)={0xffffffffffffffff}, 0x4800) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000400)={0x2, [0x8, 0xffff]}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:07:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:58 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000000)=0x8) 13:07:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 293.017736][T13254] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 293.076495][T13254] 8021q: adding VLAN 0 to HW filter on device bond47 13:07:58 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0xfffffffffffffdef) 13:07:58 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r3, 0x40184152, &(0x7f00000016c0)={0x0, &(0x7f0000001640)=[&(0x7f0000000100)="f75383cd65bbbeb776739c8f4666aee13774ab3007813b4439f61f07c6b0e54405faaf1b19e7fdf901669120cac2b7af2cf2e22077f795751ee31291588b7241bac567feb1f8c9bc29ff6b0a4840e47c6e51cd260b772dae3ed71f8265edd3af52180737281ccc43f558a3b5d3c4c5cc2b9147bc45059fbc6a4b", &(0x7f00000001c0)="4c530cf28f9633414012b2de7fd52a204fe24600f55c5597bda1c03881946806db66a88d84654e130c9a5779f3aa92c49ec8965540febab23460c48179536a402b4441a3dd3e47c826ce6152f2d6dd20c94cd32a2faa766a592f6d576352cf348eb5a525", &(0x7f0000000240)="c9bd69f36d1690b41c43110ba7b11d532a87ce5657ea2c79863947e64b3ecb22568c3adb6e4b3381e0b444889b34156e416707b169e513a23448f0aeac82283ff918001a80207ef446dbf77a4862ce5d784ce2ead64025c81e3b59e75e4b47a7e2b24ac34ec1ea87fc43c961f97339f56665687ce8d937e9e013b4f9aa656fa8acbefb03edef06a5a93b2dff37704acb1dbfa9d5aed364511e2bbed7dcf5f920ee630c70", &(0x7f0000000300)="4f6b788a6e11ebe113e122ffbd9dc7767be7e0f1591db221dffa963b5d6779b3cdd4ff9d2ad0f43caece104fb0ff14e5cff0fc388ecd7987616cfbfb87b45d59d2f1d9d9b906b88249103463d8a4e57d655115213c648fb035ddf7514c4276e32ec50afbe1724c329f62298b861b14e6aa239ca6e60c98c968c4b4850610ca1db8bb357ee32831883836dcbb086d5506739a7b14b172c33584f2628a8d85f1869c133b760a5ab4165a36", &(0x7f00000003c0)="071bda6ba788370754f970193a5fa12a63e6955cc85865db4f4816159292251f15cffd040ddcbdc0b57d419fb1241ddff084697d508ef5eb6d56967729e70335f90df7cc568f8033f9e78c63b31bb9ab3b3ff42f14d5dbeacabe16701884d82a53cf0503daddba453479ea930babde28bd09d1bfbbcc5d5faaebd82d572844793486fc18baa8aff043d82b64cb9b544508a2c9b893b6c964201536cd660cb866d3abb6be1e44e5cb499decc38922e741587a109eb4345b2132c1e448f27fb78aced6dfea0a2bb28866d89a45acfc80057ac5a6aa49ec33fb270b527c9d24", &(0x7f00000004c0)="63345ee3ff7621c06679505e053d0efb4433273ce64e3fe01c39a0dd22cfe2f0d7c0ba2ac8e19bcbdc59e018a03295f598cff6aeb893dfb9714c9ba008b5f81490601b950f3eb11a1b6b6ca1cc6d946b4851ddb8516559f5caeb8206b8d686c403279ec6413ca16d9695908f2a02835677023ea84d09c895c74504b095058feb", &(0x7f0000000540)="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", &(0x7f0000001540)="3fae43a329", &(0x7f0000001580)="a76d48befef402afeead83f1ef02cec032f66ee56a6f962eebf8b9edfa8c7b0942cf8d73bbaad25c568626016ba062531fc2673e3c413957c27fe992bfac37e6cece92e5d5221e61d6a6b30ee9e8a9ac2dbdbc7dbfafc9a17017494213b3cbd7b3dd59defe279f159c77d7104a903be5daa342ecf555ce3fceb0d12d913c74a601dba0de491a14e4541f5fcfa34d8d707e5487bd0cd034a0721b097e930f7e"], 0x5}) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:07:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:58 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) chmod(&(0x7f0000000000)='./file0\x00', 0x88) pipe(&(0x7f0000000380)={0xffffffffffffffff}) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r3 = dup3(r2, r1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x7d, &(0x7f0000000000)={r4}, 0xc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)={r4, 0xfffff000}, &(0x7f00000000c0)=0x8) [ 293.426388][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 293.426397][ T29] audit: type=1800 audit(1595941678.480:199): pid=13244 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16297 res=0 13:07:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96", 0x3) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:07:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 293.492068][T13309] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 293.556841][ T29] audit: type=1804 audit(1595941678.600:200): pid=13314 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/163/bus" dev="sda1" ino=16291 res=1 [ 293.633625][T13309] 8021q: adding VLAN 0 to HW filter on device bond48 13:07:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 293.695629][ T29] audit: type=1804 audit(1595941678.720:201): pid=13314 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/163/bus" dev="sda1" ino=16291 res=1 13:07:58 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) readlink(&(0x7f0000000100)='./bus\x00', &(0x7f00000001c0)=""/215, 0xd7) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:07:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 293.791815][T13363] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 293.862585][T13363] 8021q: adding VLAN 0 to HW filter on device bond49 [ 293.880301][ T29] audit: type=1804 audit(1595941678.930:202): pid=13396 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/164/bus" dev="sda1" ino=16307 res=1 13:07:59 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0xffffffffffffffe0) [ 293.955647][ T29] audit: type=1804 audit(1595941679.010:203): pid=13396 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/164/bus" dev="sda1" ino=16307 res=1 13:07:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:07:59 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x67, @multicast2, 0x4e23, 0x3, 'ovf\x00', 0x4a, 0xffff4892, 0x1f}, {@local, 0x4e24, 0x0, 0x8, 0x8, 0x6}}, 0x44) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) syz_usb_connect$printer(0x3, 0x36, &(0x7f0000000100)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x5, 0x20, 0x2, [{{0x9, 0x4, 0x0, 0x7, 0x2, 0x7, 0x1, 0x3, 0x6, "", {{{0x9, 0x5, 0x1, 0x2, 0x8, 0x8, 0x9, 0x5}}, [{{0x9, 0x5, 0x82, 0x2, 0x8, 0xfd, 0x9, 0x20}}]}}}]}}]}}, &(0x7f0000000200)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x201, 0x9, 0x2, 0x89, 0x8, 0x1}, 0x5, &(0x7f00000001c0)={0x5, 0xf, 0x5}}) pidfd_send_signal(0xffffffffffffffff, 0x15, &(0x7f00000002c0)={0xe, 0x3ff, 0x200}, 0x0) finit_module(r1, 0x0, 0x0) [ 294.131295][T13418] 8021q: adding VLAN 0 to HW filter on device bond50 [ 294.166650][ T29] audit: type=1804 audit(1595941679.220:204): pid=13455 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/165/bus" dev="sda1" ino=16307 res=1 13:07:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 294.378952][T13463] bond51 (uninitialized): Released all slaves 13:07:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96", 0x3) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 294.472878][ T3897] usb 2-1: new high-speed USB device number 2 using dummy_hcd 13:07:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 294.590908][T13474] validate_nla: 2 callbacks suppressed [ 294.590916][T13474] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 294.645820][T13474] bond51 (uninitialized): Released all slaves [ 294.733276][ T3897] usb 2-1: Using ep0 maxpacket: 32 13:07:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:07:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 294.835655][T13486] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 294.869116][T13486] bond51 (uninitialized): Released all slaves 13:08:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x80002, 0xb) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x20, r4, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7f}]}, 0x20}, 0x1, 0x0, 0x0, 0x4081}, 0x2002005c) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x2c, r4, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x10001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r5 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x54, r7, 0x1, 0x0, 0x0, {0x41}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_GET(r5, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r7, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x70}, 0x1, 0x0, 0x0, 0x8800}, 0x20000800) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2020, 0x1) [ 294.943438][ T3897] usb 2-1: config 1 interface 0 altsetting 7 bulk endpoint 0x1 has invalid maxpacket 8 [ 294.958450][ T3897] usb 2-1: config 1 interface 0 altsetting 7 bulk endpoint 0x82 has invalid maxpacket 8 13:08:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 294.990103][ T3897] usb 2-1: config 1 interface 0 has no altsetting 0 [ 295.061584][T13500] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:00 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000000)=0x6) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x820500) pwritev2(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)="777c38d7e9298d945c4f072c4ba8fced42548f6e4d2d884db469895af09eb2795155b6e8b6d0ceddabc6bec7b0fa5f3d8c66bbd9d22f5813cd496929ca462e36cb6fb66bf744c4f097e295e5e9dec50d89cf7bc5c1a79b16d58fa3adb7b839a8e1fd559a88a0770294020ac4be5f826fd5811d69fd9d58489c9f150fab680e74726a0c14a9cbdd924653ec78657f26746c37d01ebbe7f3a2d37c441e0df680f2b5b063f189edae59c0", 0xa9}], 0x1, 0x5, 0x6, 0xc) [ 295.109464][T13500] bond51 (uninitialized): Released all slaves [ 295.193247][ T3897] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 295.202902][ T3897] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 295.212064][ T3897] usb 2-1: Product: syz [ 295.236696][ T3897] usb 2-1: Manufacturer: syz [ 295.253935][ T3897] usb 2-1: SerialNumber: syz [ 295.293485][T13455] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 295.304973][T13455] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 295.632930][ T3897] usblp: can't set desired altsetting 7 on interface 0 [ 295.661624][ T3897] usb 2-1: USB disconnect, device number 2 [ 296.045230][ T29] audit: type=1804 audit(1595941681.100:205): pid=13455 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/165/bus" dev="sda1" ino=16307 res=1 13:08:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:01 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96", 0x3) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:01 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000000)) r2 = syz_io_uring_complete(0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f0000000080)={0x1}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) 13:08:01 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000100)={0x5, 0x7f, 0x200, 0x7ff, 0x16, 0x4}) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x5) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="062b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) finit_module(r1, 0x0, 0x0) [ 296.188448][T13536] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 296.210105][ T29] audit: type=1804 audit(1595941681.260:206): pid=13538 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/166/bus" dev="sda1" ino=16339 res=1 [ 296.264804][ T29] audit: type=1804 audit(1595941681.300:207): pid=13542 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/166/bus" dev="sda1" ino=16339 res=1 [ 296.325544][T13536] bond51 (uninitialized): Released all slaves 13:08:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xd000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendto$inet(r1, &(0x7f0000000080)="378298999dbb91b6be5a1c08e9943ee1262f8332f41ed927d1c2a6d79bc810f66d8dd129cba69b849b14030ba974cb4f87243cd04e7a1ccb0fc1090a4573eca08edda32568e50a6a89be603afdbe049cb5e39db5ec68df6821338953d0ce358fa8d2ea2f3ebe0594968c52e157a82c8ccefc11c0579eb05faf8adceb4e8982de5abd215d4f2cccdb47b8aaa2895a6a7ca820d4c27e2d3598c374d0a5568b4f7908c94b5a7a84ac8fe25d230af5aac02197898923397a9a117f370cf56d491141421241b4", 0xc4, 0x20000000, &(0x7f0000000000)={0x2, 0x4e21, @private=0xa010101}, 0x10) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000001c0)=0x1) ioctl$sock_TIOCOUTQ(r4, 0x5411, &(0x7f0000000200)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0x40086607, &(0x7f0000000180)) 13:08:01 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x5b5) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) mmap(&(0x7f0000bfd000/0x400000)=nil, 0x400000, 0x1000000, 0x100010, r2, 0x5b641000) finit_module(r1, 0x0, 0x0) [ 296.539350][T13554] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 296.584069][T13554] bond51 (uninitialized): Released all slaves 13:08:01 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat2(r2, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)={0x1002, 0x12f, 0x4}, 0x18) recvmsg$can_raw(r3, &(0x7f0000001380)={&(0x7f0000000140)=@alg, 0x80, &(0x7f00000012c0)=[{&(0x7f00000001c0)=""/112, 0x70}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/13, 0xd}, {&(0x7f0000001280)=""/60, 0x3c}], 0x4, &(0x7f0000001300)=""/71, 0x47}, 0x2002) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x82440) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, &(0x7f00000013c0)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\x00']) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x8000000) syz_memcpy_off$IO_URING_METADATA_FLAGS(r7, 0x114, &(0x7f0000000380), 0x0, 0x4) r8 = syz_io_uring_complete(r7) mmap$qrtrtun(&(0x7f0000feb000/0x12000)=nil, 0x12000, 0x1, 0x30, r8, 0x3) 13:08:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:01 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x400, 0x1) 13:08:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 296.698038][ T29] audit: type=1804 audit(1595941681.750:208): pid=13567 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/167/bus" dev="sda1" ino=16341 res=1 [ 296.811239][T13577] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 296.872223][T13577] bond51 (uninitialized): Released all slaves 13:08:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:02 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) io_uring_setup(0x6044, &(0x7f0000000100)={0x0, 0xb1b, 0x8, 0x3, 0x6f}) finit_module(r1, 0x0, 0x0) 13:08:02 executing program 0: mknod$loop(&(0x7f0000000040)='./file0/file0\x00', 0x6000, 0x1) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="00fbea020136d67c7ba868d59e3d41b18599bf2f85d3f565b6d131b29ac79771e8a6370d6f82ec75f77e8a58a8b59229b152a5052147d19c700f73b1199b8a15eeac9d8d6fe3f6240f60561a4690d6d2df68a8b1c543d5ef0e811df33c7325eae0ed3f1712b1abc9d4eea7b51c7926386c4f6c8d05317d42fc5cd701db991df543760fcd6ae34a4a1abab759106e32371ceaed2b9d99428c286ed12500d019128b31e048c6c9fe04e38550e417b623d584803766ed44f8787e9726516f05f9927efbf34966821115b56015401633c8ef38b63007790280977b2e67c0ecf4e68341ec963b360000000000"], 0xea, 0x3) 13:08:02 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet_sctp(r2, &(0x7f0000000540)={&(0x7f0000000040)=@in6={0xa, 0x4e21, 0x800, @private0={0xfc, 0x0, [], 0x1}, 0x1ff}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000080)="145eacdf3c07de848b690f2df90cac160789c059802c7d3b52067c96", 0x1c}, {&(0x7f00000000c0)="1b604cfb0bf691503cdaf73c9ab9d78984ee6e7deadbb4f9dabefcf14ee6eec8c575db7608fbd70a3286ab3cd5f4acf58ecfa3b0da6263f9e8c49675e094d457a4062bbf831d059336497b11e05088534855aa23accf5f2d2b43fff667186882c40d60c5756d8752fc3378960a16af85e68dc5ef80c987606d83817dabbf8539ec390f533100eda0efa6d220e71a4eb686f904b86c76b9cf75713e6c3d5b6e85d7", 0xa1}, {&(0x7f0000000180)="23d2b20f4c5a3675952c763d8b6d5933e0b81d055a7b79efc01ed735e38f14c8d6fc08659fab29ee76d30b3ff73f6ec36127dfd3a1b301277d70fcc797c567df0a2b256bd6245ce8ce32d79a04effbaec890e1a3803f89ca8ec3", 0x5a}, {&(0x7f0000000200)="59ffe236a1112498591acc5fc40d5833e87d5f1ae30e2d05edf445e24c71c9879eef41bff0c7a3e67fc244a9d0e22d98067231b571271beaaba830de5cb9e11674541642506ba590419d8a8b23b08e2d7193febc7076822b7b27e22fb499f99aff2c5f2d3077e4ce0a77a81eef6df51874b1a566206733aca07265d6d59030b6637ecc906f73ae5443c99375c74984767a841fe5429373fa0d7d63652d4f6c1b3dc15e04d3afffee3d4cf211fd17", 0xae}, {&(0x7f00000002c0)="17e7dc63f2cab4f98b9ee7b74d3e00bb66e79b2d768f045d8298bb2ae144a65ff67b1d2f38b48bfdff5e2c83a6a5bb92ca7291aba4fb157ffe74685a7993d47f68a5bd8f22f58df095990b07614269d933dfc650556f98e269f1873a8735657ef45feeff5b2f02fce4080f2e5ae4a7762843ce4a6f83c83fb20e111d766636a408435fcd0f98850ab405abc37aff41f7b3526ebd50aba753bad52aea09d0e8a034ad976fcda6f797be33d833c5ccef7a6c9ef54ec0b25c23b7c29c073e1de8097c163be12952a2cafcc68f0cb7336af4eabaa13d2a9aba57dd475a83cb1e005913592ef4685b72ebb8aa274a1fed8aa139073deb", 0xf4}, {&(0x7f00000003c0)="761e5db3ed8097c1c6616d2e6401db42ee34b40a7a80db4d46ba8d5564b6eefe2d8f95b5963d34ccc5abe7b1238ee31385da2e574064ce7eb6b2277c0bcf285a5e1de7787a392d9ec04b37e84b7b196d54ec3cd0d7df504237da8b786f9e6e50c4652ac68245edb0c30c1398e356afea11d129105e6f6bc57a47ca5bf765fadb2beb5adc1b6e51231639896bae1d1036c967307f0ee40d2c9d84136f8539e5bde1f38237825d7fee3ca57ce24f60d0eb311e48995a07b829e7836a4f", 0xbc}], 0x6, &(0x7f0000000500)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @dstaddrv4={0x18, 0x84, 0x7, @private=0xa010102}], 0x38, 0x20008091}, 0x4000000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0xffffffbf) copy_file_range(r3, 0x0, 0xffffffffffffffff, &(0x7f0000000600)=0x6, 0xc7, 0x0) listen(r4, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) sendmmsg$sock(r8, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$KVM_IOEVENTFD(r6, 0x4040ae79, &(0x7f00000005c0)={0x4, &(0x7f0000000580), 0x4, r8, 0xe}) 13:08:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:02 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c0000000714000827bd7000fcdbdf250500540000000000090000002334a62c64233cc7ac286235911e296da860e4b4e5e641d990a274539f6cec8652bb7ebe066193f1a8b47a"], 0x2c}, 0x1, 0x0, 0x0, 0x40804}, 0x4004000) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x10, 0x1) [ 297.090847][T13599] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 297.111177][T13599] bond51 (uninitialized): Released all slaves 13:08:02 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x101) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r4, 0x84, 0x74, &(0x7f0000000080)=""/75, &(0x7f0000000100)=0x4b) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x11000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:02 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r3 = dup3(r2, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000000)={r4}, 0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r4, 0x80000000, 0x7}, &(0x7f00000002c0)=0xc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) sendmmsg$sock(r8, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) recvfrom$ax25(r8, &(0x7f0000000100)=""/116, 0x74, 0x40000102, &(0x7f00000001c0)={{0x3, @default, 0x5}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default]}, 0x48) finit_module(r1, 0x0, 0x0) [ 297.314060][T13617] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 297.351719][T13617] bond51 (uninitialized): Released all slaves 13:08:02 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:02 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$MEDIA_IOC_REQUEST_ALLOC(r1, 0x80047c05, &(0x7f0000000040)=0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000080)=0x705cd503) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RREADDIR(r3, &(0x7f0000000100)=ANY=[], 0x2) 13:08:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x12000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:02 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:02 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000440)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000000000001050001000000000014000300fc020000000000000000000000000000050001000000000028f6e8e3f54b1261400be9755feefb1f23c288df40579e490225e824a712b5ccd3312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab208d44fb1d27ccefc871c058db47eeac6111786c987cab"], 0x64}, 0x1, 0x0, 0x0, 0x4808}, 0x4000000) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000840)=ANY=[@ANYBLOB="908f8dcae4558143fc68df", @ANYRES16=r2, @ANYBLOB="000125bd7000000000000000000008000400ac1414bb14000300fe8000000000000000000000000000aa14000200fc02000000000000000000000000000114000600626f6e645f736c6176655f300000000014000300fe80008cb1b3d4f67f2d94000000003314000300fc01000000000000000000000000000014000200fc0200000000000000000000000000012800070073797374656d5f753a6f626a6563745f723a706f7765725f6465766963655f743a7330001400030000000000000000000000ffffe0000001"], 0xd0}, 0x1, 0x0, 0x0, 0x8800}, 0x4040000) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc3, &(0x7f0000000100)={&(0x7f00000006c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x4000001}, 0x8040) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x14, r2, 0x800, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000091}, 0x80400c0) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="1970fd50562c5493000000", @ANYRES16=r2, @ANYBLOB="080026bd7000fddbdf2502000000050001000100000014000600766972745f7769666930000000000000"], 0x30}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000001) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x48, r2, 0x100, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x64010101}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x48}, 0x1, 0x0, 0x0, 0x8040}, 0x800) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000500)={0x60, r2, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @NLBL_UNLABEL_A_SECCTX={0x1b, 0x7, '/usr/sbin/cups-browsed\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x60}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r2, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6tnl0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bond_slave_0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x68}, 0x1, 0x0, 0x0, 0x24000804}, 0x41) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x400, 0x70bd27, 0x4, {}, [@NLBL_UNLABEL_A_IFACE={0x14}]}, 0x28}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) 13:08:03 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x400800, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000000)={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @private=0xa010101}, 0xc) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) lseek(r0, 0xfffffffffffffff9, 0x1) 13:08:03 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00', 0x0, 0x10}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f00000000c0)="e7428f3438bf", &(0x7f0000000100)=""/49, 0xff8c4c335a7c0243}, 0x20) 13:08:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:03 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$RTC_VL_READ(r5, 0x80047013, &(0x7f0000000100)) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:03 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) recvmsg(r1, &(0x7f0000019a40)={&(0x7f0000019640)=@nl=@proc, 0x80, &(0x7f0000019940)=[{&(0x7f00000196c0)=""/93, 0x5d}, {&(0x7f0000019740)=""/30, 0x1e}, {&(0x7f0000019780)=""/229, 0xe5}, {&(0x7f0000019880)=""/132, 0x84}], 0x4, &(0x7f0000019980)=""/176, 0xb0}, 0x40010100) r2 = dup2(r0, r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x101000, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = accept4$rose(r2, 0x0, &(0x7f0000000000), 0x1000) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$nl_generic(r9, &(0x7f0000019cc0)={&(0x7f0000019a80)={0x10, 0x0, 0x0, 0x1400b01c}, 0xc, &(0x7f0000019c80)={&(0x7f0000019ac0)={0x1ac, 0x2c, 0x2, 0x70bd27, 0x25dfdbfe, {0x1e}, [@nested={0x196, 0x2d, 0x0, 0x1, [@generic="10207fea66b58c9c67f3bf74c3952b3320f650f72e42391e0eb2162170e36de261e13d158b6c14b92d50d194d8b789a6cf14304d389dfd5856acd7525af5827a0d4e00a54db9029be5964a924a4698682c8f6065817298fb09528c1d0b1fcd22860eb5b76e813e2d4e0eab6daebf1cd048f506c995cbd637afd564d5dab0600a10836bed87411a33f8c6d3118d", @typed={0x14, 0x65, 0x0, 0x0, @ipv6=@local}, @typed={0x14, 0x96, 0x0, 0x0, @ipv6=@local}, @typed={0x8, 0x13, 0x0, 0x0, @u32=0x7}, @generic="647c18458d8af731df9eb8703075af428d691b557d9326e4314c775b735d3cf8a39fc935815a44ea83deadd1c324f51279a825ec45488de33cedabeec956d7d957dc89b19fa92c84ae5d2707d0443cf23706974465c1fac004494d0e551ecfbde8104c5a889dc392b48bf66b3d084108d15e3c00404eabdbe78ea3ca623b8e8d62e2602f2723cbd633c7afb5a18e1e34156a72d50b3af84a79de5234e5e177b144", @typed={0x14, 0x39, 0x0, 0x0, @ipv6=@private0}, @typed={0x1f, 0x84, 0x0, 0x0, @binary="dd7cab7664910215117272d2fa269414c19615e7a832b93801d01a"}]}]}, 0x1ac}}, 0x8090) recvmmsg(r7, &(0x7f00000005c0)=[{{&(0x7f0000000080)=@isdn, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/75, 0x4b}, {&(0x7f0000000180)=""/104, 0x68}, {&(0x7f0000000200)=""/69, 0x45}, {&(0x7f0000000280)=""/193, 0xc1}, {&(0x7f0000000640)=""/102400, 0x19000}, {&(0x7f00000003c0)=""/61, 0x3d}, {&(0x7f0000000400)=""/163, 0xa3}], 0x7, &(0x7f0000000540)=""/113, 0x71}, 0x9}], 0x1, 0x2042, &(0x7f0000000600)={0x77359400}) 13:08:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:03 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) r5 = dup2(r4, r1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = accept$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r8, 0x800c6613, &(0x7f00000000c0)=@v2={0x2, @adiantum, 0x0, [], "bac5d7aabe8edafe232ce13d34d88380"}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:03 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x800, 0x0) 13:08:03 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r6) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYRESHEX, @ANYRES16], 0x1) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="140b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x10b080, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r9, 0x806c4120, &(0x7f00000001c0)) 13:08:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:04 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x4740, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 298.931386][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 298.931396][ T29] audit: type=1804 audit(1595941683.980:216): pid=13693 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/171/bus" dev="sda1" ino=16366 res=1 13:08:04 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) fremovexattr(r3, &(0x7f0000000040)=@random={'osx.', '\'%\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:04 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) sendmmsg$sock(r7, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r8 = accept4$tipc(r7, 0x0, &(0x7f0000000200), 0x80800) r9 = dup2(r8, r4) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) finit_module(r9, 0x0, 0x0) 13:08:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 299.130981][ T29] audit: type=1804 audit(1595941684.020:217): pid=13693 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/171/bus" dev="sda1" ino=16366 res=1 [ 299.255529][ T29] audit: type=1804 audit(1595941684.230:218): pid=13720 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/172/bus" dev="sda1" ino=16366 res=1 [ 299.313774][ T29] audit: type=1804 audit(1595941684.260:219): pid=13720 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/172/bus" dev="sda1" ino=16366 res=1 13:08:04 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:04 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1, 0x1) 13:08:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x25000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:04 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x444203, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendto$phonet(r3, &(0x7f0000000100)="c89447c544ffccf30caf0dd3b685ca00764b7b6f03d4172f1754bc7ea2da02b630faf7021b7440832714674475d99ace9782e831009309fab37ac025de896c4432d07cce", 0x44, 0x20040095, 0x0, 0x0) ioctl$FBIO_WAITFORVSYNC(r3, 0x40044620, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:04 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="f428", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x40) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) syz_open_procfs(r4, &(0x7f0000000100)='net/stat\x00') finit_module(r1, 0x0, 0x0) 13:08:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:05 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f00000001c0)=[{{0x0, 0xffffffffffffffbd, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) sendmmsg$sock(r6, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) vmsplice(r7, &(0x7f00000009c0)=[{&(0x7f00000003c0)="56ee89cf8ebaabb4e83aaf221f8ba2b056f1028ff40825ceaf79d7457c7443c78c0d381b60aa99a17adca826c9a4c7264b51c6758126c0e27407ddac5c9bfccef5bb83329e8f17f50abcac3029f62da0771604a84d8ddcbbf6ead9c850054b1498b19a8d5b4f525ff0e9f1428683e3b3dda0b66e55040d30147a905b23d2ad015d9fb06ecd9972004ad17a53d8011f4aa75a2750938957f13bb19544a74416b533ef53f455791502eb5c619863f7f6888facd0454bff8d261c8efe2990e9dab4f94fe327926618", 0xc7}, {&(0x7f0000000180)="7ec3c2659f9ee3ff19fc961a67efc15beeb49378189a508b35208a5c2576ed5f5b3c", 0x22}, {&(0x7f00000004c0)="1885952c7c0463a6f4bf4a25a0b2811e887982dd870ec79ea8b6e3090513c57444e1425b3a05e03fcfec9bf7d1c0fa5d2830cf8da8e297a48ba8e22938e7a7fb1c21bb6b0ffcd716defe011db31aeb77456d854dc117293b7bfea73c20f3b7b7865dd25eff19508c7cafddf5330fd856e10c12f78cc25361f49acfa445156b967dbed53bb1aa2e4399a5a1aeb37f2a", 0x8f}, {&(0x7f0000000680)="10a51be4a8decf81e6cb1be3c213be678b0462ae206a0ab2326a186b6de07ff135542ef530aa94fbb69da55669dfa9dffc482db32d42a36c4241f337deca6aca4815e5397aff33da5e4a590499ca49cd59114edde89d7c3dc557eec34e8e9ce89ba479ab669a59799c93ba3142f76073ecb9f44de5005b76ec73dbcc28d5fd8582c507b4e2c67b3709dcb7132f9498d89f5049ff8dcec49f8ad1a6cc3e5320808b3845e3f2021e6e1f076a1571f28774569f573143c6c8fded1f1cb0b5216ea4fe0d720a9be1ce9ce5b1d9c37c2fe6bb0e1596150dc3741332df6e096a7e0d75e7a1ecbac40575b65eff15beb289add20fa1ec94e721116d721520b959", 0xfd}, {&(0x7f0000000780)="f6f09c5b43d0bd754dc7785746501f9cc4862741a48a53d75f9327b6df90097aebbda3f2c61574c65e62940f990e5795f6dda2bbd2eca17fd57feeaba27e775a7a8aa37d068c338c5d84c7761a91a80b81b66be946ab13ad6ab96e2cb19a27e97ec8dee74fe9e74db71930efe29835f610ec37020257d50a0ee03aff48f82b4fc6e10f6e62e7ecb7d785d6", 0x8b}, {&(0x7f0000000840)="65a955c811064208e20a36336da1eee48de7bbc6e2b0180469e71d4d930b6bdd371f9988ce604ae1c3795dd39be22d0c4312a97729b456b9b428592a5b783fcda704d17a11d6b18fa019c186635be205a9689896245db4b679571d37f2337daf6050d021a7cdfa93f111ae30c0101cdab97d60b783833973caf497abfcc7b47654ddf606ed737222cebf9201e264cf8cbea4ea859d507d2089fa147f86de6e66eedcd8ebd6f47f42c552bc91726d657a", 0xb0}, {&(0x7f0000000900)="829ff51dc68771231a955941203c4d962c34d1c09f32d53b1103f24b668fb9b19c9b13c8162cfa79859d30407002b3eee077ff515a9b19b8d0859ecf628a6a4b3fe268ad97538ca8b337a3def1d82897f4953cb105532ef8cabcb49e2e7aaebf3a018b0676e240549037066b38b1e7f909a4cb4d94422f3e0c10e19908c6d3c3123335fba35b600c1805deda8e", 0x8d}], 0x7, 0xd) setsockopt$netrom_NETROM_T1(r6, 0x103, 0x1, &(0x7f0000000140)=0x3, 0x4) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000080)='./file0/file0\x00', 0x5, 0x0, 0xfffffffffffffffd, 0x2000000, &(0x7f0000000a40)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030353431372c6e6f61560428c30430879d2fec8916636c2c6661756c745f696e6a656374696f6e3d3078303030303030303030303030653033642c6e6f757365725f78617474722c6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030332c6e6f757365725f78617474722c646f6e745f61707072616973652c6f626a5f747970653d2c61707072616973652c657569643e", @ANYRESDEC=0x0, @ANYBLOB=',fsuuid=f90feae1-e212-3ccc-8efc-44bf855e,dont_hash,subj_user=-,smackfshat=)\'[,audit,euid>', @ANYRESDEC=r4, @ANYBLOB=',\x00']) [ 299.898759][ T29] audit: type=1804 audit(1595941684.950:220): pid=13743 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/173/bus" dev="sda1" ino=15795 res=1 13:08:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:05 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x4100, 0xc9) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="040dd0a0da4235e58b9e501044fa637dcf379174a0ca49472b9807305b735283b02cecb2ff62af939c6837c5cbf8795a926be28e6ff90f57dfae8a5cc4fe0a4c1368ecdf62ac08af2030010b6272d2015719397601b07d19d900a71b1b28d18fd8", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2c000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 300.030925][ T29] audit: type=1804 audit(1595941685.080:221): pid=13759 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/174/bus" dev="sda1" ino=15795 res=1 [ 300.080879][ T29] audit: type=1800 audit(1595941685.080:222): pid=13759 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15795 res=0 [ 300.156378][ T29] audit: type=1804 audit(1595941685.140:223): pid=13759 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/174/bus" dev="sda1" ino=15795 res=1 [ 300.185928][ T29] audit: type=1800 audit(1595941685.140:224): pid=13759 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15795 res=0 13:08:05 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x4) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000100)={{0x2, @name="405431f852ebe9538f4a22f2405add597f5ddf984f625ea62cd087f5416f7933"}, 0x8, 0x6, 0x3}) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:05 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_RESET(r0, 0x5000, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) chroot(&(0x7f0000000040)='./bus\x00') 13:08:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:05 executing program 0: timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) rt_sigaction(0x2b, &(0x7f0000000140)={&(0x7f00000000c0)="3e2e42aac4c37d7c3d02000000970f98c864f3470f1ee93641831928c4c2798c66f4c8000000670f1eee660f383807c462e992b4d810000000", 0xc0000003, &(0x7f0000000100)="a526f242af67dff0c422f91da000000000c4617d2bbe0fa00000c4019d6b4e00c441c1fdd741b1faf2f3f26526420f1f4000c4e111ee5800", {[0x62]}}, 0x0, 0x8, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r0, 0x0, &(0x7f0000000180)={{r1, r2+10000000}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x3938700}, {0x77359400}}, &(0x7f0000000080)) 13:08:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2d000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 300.751880][ T29] audit: type=1804 audit(1595941685.800:225): pid=13785 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/175/bus" dev="sda1" ino=15954 res=1 13:08:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:05 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:05 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x161000, 0x126) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="39d509293436fbad4aa27c689fb2e53d21c9d83f666238016e3946d2f42276c617dd1404e338602938dc22201ac3db3b8e69ed7d97b75951b1aec121895dafdcb2655abf67b92fc7e0024033d199db991ec9d1631c193cd9a0a28bec46081aaaefab2af1f7fc52617fe03a15f6c9bb05b50f4f4e0a576543263523bb9377971ba4795903da9d608af91b54b4999e7af00e8a2ee89d117f519445478da3c38c0161b5b7a2444b0273da407cb14117ce4bf8f87112b7b49cbb53caa66c0093", @ANYRESOCT], 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r1, 0x4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) dup3(r3, r0, 0x0) finit_module(r1, 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r5, 0x65, 0x4, &(0x7f0000000100)=0x2, 0x4) 13:08:05 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)={0x3c, r5, 0x90fc047e054328f9, 0x0, 0x0, {}, [@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, "9dd8b952808dd9e28d032e0e3f4e9b991a1711e8bd0b95b7efd3d325983a8ecb0ea8f0e6"}]}, 0x3c}}, 0x40001) sendmsg$NL80211_CMD_SET_BSS(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r5, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x9}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2000c010}, 0x0) r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x80000, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r8) openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SG_NEXT_CMD_LEN(r9, 0x2283, &(0x7f00000001c0)=0xb3) 13:08:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x35000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 300.907618][T13802] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:06 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) lseek(r0, 0x2, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:06 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="cf92b046df64105e9156fe5f8b74224bc4", 0x11) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) [ 301.152485][T13825] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:06 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0x800000000000000, 0x0, 0x0, 0x6e, 0x8, [{0x4, 0x100000000, 0x5}, {0x400, 0x101, 0xf91, [], 0x200}, {0xc2000000000, 0x3, 0x3, [], 0x584}, {0x7, 0x2, 0x8, [], 0xc}, {0x2, 0x4, 0x100000001, [], 0x3488}, {0x1, 0x2, 0xfff, [], 0x80}, {0x6, 0x7, 0x773a, [], 0x1200}, {0x3, 0x40, 0x3, [], 0x3801}]}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:06 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x41) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000001, 0x11, r0, 0xab) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_io_uring_complete(0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40400, 0x0) write$P9_RREADDIR(r3, &(0x7f00000002c0)=ANY=[@ANYRESDEC, @ANYBLOB="84f14446f90012385f967e39bc469bbb0d04508905b3c48c914ff9cc6e08286bec3dc6b5d0d95cb5826054a63ec324eee5f6a2a7a058b4345fa1154b80d180dfa8f02e79ea593750c99e083011f76d31bb3e5da10fe6f6e0f296a37023ef8576d5d06a642634baf9ff2328b05a54eadb8296af0623fbeb2750ea084ad2f48bcf136a37bd3fc2e77910086b9d0739ebea040697b48d2e3d2a75fbbbc9e5d996770ffa1af4a7c4bcb10ed3061eae7ac61f919753fdcb00b5bbc20c685b0ef1c1ef3f395a137e836315", @ANYBLOB="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"], 0x2) 13:08:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:06 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setuid(r1) quotactl(0x3f, &(0x7f0000000000)='./file0/file0\x00', r1, &(0x7f0000000080)="140a9952293d68783406c156e2e3b5fa0e8cb1b549b5943479ca4ce1bc79143227e1a36499d3d1202dbef409db9a20008c57c0ddf78111e004a59ca09d6b7595300db13dad35105fc42b7d96d1d1") [ 301.680594][T13836] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:06 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$inet(r1, &(0x7f0000000100), &(0x7f0000000140)=0x10) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000240)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, r3, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x4010) 13:08:06 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1, 0x40) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00', @ANYRESOCT=0x0], 0x2, 0x2) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000900)={0x2c, 0x0, r5}, 0x10) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r7) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14, 0x44}, @in6=@private2={0xfc, 0x2, [], 0x1}, 0x4e20, 0xfff, 0x4e21, 0x3, 0x2, 0xa0, 0x80, 0x3a, r5, r7}, {0x0, 0xfae, 0x3, 0x81, 0xfff, 0x0, 0x57d, 0x7}, {0x0, 0x101, 0x80, 0x7}, 0x4, 0x6e6bb8, 0x0, 0x1, 0x1, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4d4, 0x33}, 0xa, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3505, 0x4, 0x3, 0x5, 0x8000, 0xffffff2a, 0x6}}, 0xe8) 13:08:06 executing program 2: r0 = open(&(0x7f0000000000)='./bus/file0\x00', 0x0, 0x28) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) sendmmsg$sock(r6, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) sendmmsg$sock(r8, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$FICLONE(r6, 0x40049409, r8) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 301.886435][T13857] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 302.023807][T13870] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x0, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:07 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) socket$phonet(0x23, 0x2, 0x1) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) sendmmsg$sock(r2, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000b00)={'raw\x00'}, &(0x7f0000000b80)=0x54) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000009c0)={0x0, 0x0}) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000a40)=r3) r4 = syz_open_dev$vcsu(&(0x7f0000000a80)='/dev/vcsu#\x00', 0x3, 0x4000) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000000ac0)={0x1}) ioctl$SNAPSHOT_UNFREEZE(r0, 0x3302) r5 = syz_usb_connect(0x1, 0x63f, &(0x7f00000000c0)={{0x12, 0x1, 0x1, 0x38, 0x1c, 0x47, 0x20, 0x1519, 0x452, 0x8d6, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x62d, 0x4, 0x3, 0x7f, 0x20, 0x0, [{{0x9, 0x4, 0x83, 0x2, 0x4, 0x87, 0xa2, 0x8, 0x8, [@cdc_ecm={{0x9, 0x24, 0x6, 0x0, 0x0, "c5e08dc5"}, {0x5, 0x24, 0x0, 0x2}, {0xd, 0x24, 0xf, 0x1, 0x2678d327, 0x2, 0xfeff, 0xff}, [@mbim={0xc, 0x24, 0x1b, 0x0, 0x75, 0x0, 0x8a, 0xd72d, 0x6}]}, @uac_control={{0xa, 0x24, 0x1, 0x8, 0x1}, [@mixer_unit={0x8, 0x24, 0x4, 0x2, 0x4d, 'i3x'}, @selector_unit={0x7, 0x24, 0x5, 0x1, 0x6, "d17b"}, @mixer_unit={0x6, 0x24, 0x4, 0x5, 0x7, "d5"}, @feature_unit={0x9, 0x24, 0x6, 0x3, 0x4, 0x1, [0x8], 0x9}, @processing_unit={0xb, 0x24, 0x7, 0x3, 0x5, 0x5, "0f9fb209"}, @selector_unit={0x7, 0x24, 0x5, 0x4, 0x8, 'J/'}]}], [{{0x9, 0x5, 0x1, 0x0, 0x400, 0x6, 0x0, 0xff, [@generic={0xb9, 0x31, "afd66aaf8c362009ad300dac1e6e994ad57ea2dfd3eb7f57e8fe6c366577f8f975c59168aed5eac18a8b071b3d2487a5ccab918a78e6a75b8f986064c6411325d02d5e763be14caf5de755af882b9cddec8cf70390d9f133373f8bfb389617e821516f1b1ccf965f2c82ee63ea89a9e8648812c0e17ab44d349804b226d9bcec9dec114b9004399c3ad9142dcdfed69c053ba8f9410126873484cdf6225c13a07f6d6fad65b7d5e10a3a94a6496ea83f3af29bfd7d1fbe"}]}}, {{0x9, 0x5, 0x6, 0x14, 0x8, 0x40, 0x1f, 0x1, [@generic={0xb8, 0xc, "1b7b9e3f892099c50248f5cf16b47638309942926a8ee24599b4ef8a026ab267f143d67fde533c1ba0b5527e16bffc00b5f6f54e5ccd5880ee82bffca4c3325c808be1c8e10813b66903cef62cca269647a7806500a1c1f2661ccd33359ba95a66cbf5740ff77f53ecc4357c4d87c5e79093fb35fca9950f293207ae3e53abdede508b0d6165454f0d547d1b7635f5d297a24bc2e545776cd05b47c79e5364c4b2d31f12a5db7c7c6d24b6ef7b5bac2996d33f2b95a5"}, @generic={0x38, 0x1, "be285252d43587223354c197d0f64e3df71da3d246892ae01177bdc2c2bbb482388fc22bb8bf477fcf0fcd763df499d6f1f201b2810c"}]}}, {{0x9, 0x5, 0x2, 0x0, 0x3ff, 0x1, 0x4, 0x20}}, {{0x9, 0x5, 0x3, 0xc, 0x8, 0x80, 0x0, 0x3}}]}}, {{0x9, 0x4, 0x8e, 0x5, 0x5, 0xdc, 0xc, 0x6e, 0xd2, [], [{{0x9, 0x5, 0xa, 0x1, 0x3ff, 0x76, 0x1f, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x80, 0x6}]}}, {{0x9, 0x5, 0xb, 0x10, 0x3ff, 0x5, 0x1f, 0x8}}, {{0x9, 0x5, 0x1, 0x8, 0x200, 0x8, 0x7a, 0x1, [@generic={0x63, 0xe, "bbf81fef859344ce7a06ee5bfb2c04e94024561ec98f5d22b06413b5af3b6f68edc64af7cf0b299509b41dd78e647c4c50d1ef8fb98b1e3dca6a24f9c06d0703939a6c5f50ac7771607060e7c44583f50f338edce1cbc69b3cdcc78788f567b286"}, @generic={0x9, 0x8, "7ebfe9d4a347f9"}]}}, {{0x9, 0x5, 0x0, 0xc, 0x400, 0x6, 0xff, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x40, 0x5}]}}, {{0x9, 0x5, 0x8, 0x8, 0x8, 0x3, 0x0, 0xff, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x3b, 0x6}]}}]}}, {{0x9, 0x4, 0xdd, 0x9, 0xc, 0x55, 0xdb, 0x85, 0x9, [@generic={0xda, 0x22, "636659a25a2df108052279046b38bc0c07bf29d8b764e50e8220a16c805b192865255cf22058406b9c95971c461de7a76aeafb78f1756d764b7bd462753ceb05903c2e1b47d39571756d3b733c72741af58b7cbc6ae1c02cc5ddc1375576031c06d04ca798998de31d4fd010ea7cc9d43de974274989e8bafdd50d459f9cf58c8102b9e8437374519ff318ee11124ea9bb4a284957b2951006b417372208e9c9e61a04bb90d77e8e98999acc18e678c5be8c898107e29752878695a364f93fbc292056e99d750ca66c10497992abe327a25bb00ec1a1e95e"}, @uac_as={[@as_header={0x7, 0x24, 0x1, 0x7f, 0x3f, 0x1007}]}], [{{0x9, 0x5, 0x1, 0x10, 0x8, 0x40, 0x6, 0x3f, [@uac_iso={0x7, 0x25, 0x1, 0x3, 0x1, 0x8}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x35}]}}, {{0x9, 0x5, 0x3, 0x0, 0x8, 0x5, 0x9, 0x7f, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x3, 0x3}]}}, {{0x9, 0x5, 0x9, 0x0, 0x3ff, 0x0, 0x5, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x13, 0x3}]}}, {{0x9, 0x5, 0xb, 0xc, 0x10, 0x2a, 0x0, 0x1}}, {{0x9, 0x5, 0xc, 0x10, 0x400, 0x91, 0x0, 0x50, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x8, 0x4}, @generic={0xf1, 0x8, "264149f08c75d9bf549104bec66947518fabf8d4dca5fabe675c1eca79a6168421da2fe59fc3c4216b2211ad2028bc3f9c190fa1f11ebc701664f7f9e05258c1adc5451e0349c0d771f7d1ecc93c98832974a118f75acf85624e4527dd1e28512a1a21e5efe02c86e85afa2eb8cc68b797a938ca52318d5a94ab7ee3f362e30a4c6d3c04a22c4e5abdc06b28f75e126a047f5b6ecd45cbf3d3285dad8ae598d040d24adf6a97e3b4af5af7d32ec5501f01285ec0858ab1d4d4b371e935e1ef76e2b81695e1a2d0547a477efbd3134258169c1e92da036f3803ae597ee64e82bae6e5cf42e96aadd621301ad73f86a2"}]}}, {{0x9, 0x5, 0x80, 0x9, 0x8, 0x0, 0x20, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x40, 0x3ff}]}}, {{0x9, 0x5, 0x1, 0xd, 0x1ff, 0x5, 0x2, 0xb2}}, {{0x9, 0x5, 0x1, 0x8, 0x40, 0x3, 0x1, 0x8}}, {{0x9, 0x5, 0xa, 0x0, 0x3ff, 0x3, 0x9f, 0x2e, [@generic={0x4f, 0x1, "a7e120cb8ce597f172d8351fee1758303ea26994832155f3bd828a7f56510e9f01d15cb324ef5d8e287843058d6bfc01181df8f9cee8eb1bcad674b031a3bd521ffc6aec73823a1b69a9c9d847"}]}}, {{0x9, 0x5, 0x0, 0x13, 0x70, 0x7, 0x4, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x4, 0x4}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x0, 0xff}]}}, {{0x9, 0x5, 0x2, 0x0, 0x3ff, 0x0, 0x7, 0x7, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x9f, 0xfe01}]}}, {{0x9, 0x5, 0x4, 0x3, 0x3ff, 0x0, 0x0, 0x0, [@generic={0xa, 0x6, "a31f30671c946761"}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0xb1}]}}]}}, {{0x9, 0x4, 0x7, 0x40, 0x2, 0x99, 0x79, 0xe9, 0xb4, [@hid_hid={0x9, 0x21, 0x3b7, 0x3f, 0x1, {0x22, 0xec1}}, @cdc_ecm={{0xb, 0x24, 0x6, 0x0, 0x0, "aa410c93e652"}, {0x5, 0x24, 0x0, 0x9}, {0xd, 0x24, 0xf, 0x1, 0x800, 0x5, 0x1d, 0x9}, [@mbim={0xc, 0x24, 0x1b, 0xfff7, 0x6, 0x2, 0x5, 0xda26, 0x1}, @acm={0x4, 0x24, 0x2, 0xa}]}], [{{0x9, 0x5, 0xd, 0x10, 0x400, 0x9, 0x8, 0x1}}, {{0x9, 0x5, 0xa, 0x10, 0x10, 0x7f, 0x6e, 0x6}}]}}]}}]}}, &(0x7f0000000900)={0xa, &(0x7f0000000700)={0xa, 0x6, 0x201, 0x9b, 0x4, 0x1f, 0xff, 0x80}, 0x48, &(0x7f0000000740)={0x5, 0xf, 0x48, 0x6, [@ptm_cap={0x3}, @wireless={0xb, 0x10, 0x1, 0x0, 0x0, 0x2, 0x9, 0x101, 0x7}, @ss_container_id={0x14, 0x10, 0x4, 0xf7, "346517ce272a0e37ce91f754941d0f4b"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x1, 0x0, 0x7, 0x4}, @ss_container_id={0x14, 0x10, 0x4, 0x5, "e14ef9f96abdb616d385f53aaf491d6b"}, @ptm_cap={0x3}]}, 0x5, [{0x4, &(0x7f00000007c0)=@lang_id={0x4, 0x3, 0xf8ff}}, {0x21, &(0x7f0000000800)=@string={0x21, 0x3, "842702b9658f4af655e1a11a263fa736919158a9b47377c61251a1b4e9d72a"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x430}}, {0x4, &(0x7f0000000880)=@lang_id={0x4, 0x3, 0x419}}, {0x22, &(0x7f00000008c0)=@string={0x22, 0x3, "4b25fb3ee4bccb04b6116e0cfa546616ec78cc7a4e3e2de3bb902c185a819869"}}]}) syz_usb_ep_write$ath9k_ep2(r5, 0x83, 0x12, &(0x7f0000000980)=@conn_svc_rsp={0x0, 0x0, 0xa, "54f4c7ad", {0x3, 0x0, 0x0, 0xae, 0x8, 0x81, 0x1}}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x2, 0x1) 13:08:07 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000280)={'tunl0\x00', 0x0, 0x10, 0x7800, 0x3ca, 0x9, {{0x40, 0x4, 0x1, 0x8, 0x100, 0x68, 0x0, 0x7, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, {[@timestamp_prespec={0x44, 0x24, 0xce, 0x3, 0x8, [{@multicast2}, {@private=0xa010100, 0x1}, {@loopback, 0x20}, {@private=0xa010101, 0x5}]}, @timestamp_prespec={0x44, 0x24, 0x8f, 0x3, 0x5, [{@rand_addr=0x64010101, 0x16a}, {@rand_addr=0x64010102, 0x4}, {@multicast2, 0xd7}, {@private=0xa010101, 0x100}]}, @ssrr={0x89, 0x7, 0xc3, [@private=0xa010101]}, @noop, @timestamp={0x44, 0x18, 0x80, 0x0, 0x0, [0x2726477a, 0x40, 0x3f, 0x4, 0x8]}, @timestamp_prespec={0x44, 0x2c, 0x72, 0x3, 0x7, [{@private=0xa010101, 0x5}, {@dev={0xac, 0x14, 0x14, 0x39}, 0xff}, {@loopback}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x9}, {@remote, 0x2190f372}]}, @ssrr={0x89, 0x23, 0xa1, [@dev={0xac, 0x14, 0x14, 0x3a}, @dev={0xac, 0x14, 0x14, 0x40}, @remote, @local, @local, @multicast2, @dev={0xac, 0x14, 0x14, 0x38}, @multicast1]}, @lsrr={0x83, 0x1b, 0xb6, [@multicast2, @multicast1, @remote, @private=0xa010101, @remote, @private=0xa010101]}, @noop, @ssrr={0x89, 0x17, 0x4, [@multicast1, @multicast1, @private=0xa010101, @local, @rand_addr=0x64010102]}]}}}}}) r5 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:07 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101000, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000080)=0x169, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x895b) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x5c000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 302.644990][T13887] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c00010062"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:07 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYRESDEC=r3, @ANYRES16], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x64010000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:07 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) sendmmsg$sock(r7, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) write$P9_RREADDIR(r3, &(0x7f0000000040)=ANY=[@ANYRESOCT=r7], 0x2) [ 302.812432][T13906] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:08 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_TIMERSLACK(0x1d, 0x7) ftruncate(r1, 0x5) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_mreqn(r7, 0x0, 0x88b558dc835b9ad, &(0x7f00000000c0)={@empty, @dev, 0x0}, &(0x7f0000000140)=0xc) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000300)={'syztnl1\x00', &(0x7f00000001c0)={'gretap0\x00', r8, 0x1, 0x40, 0x3, 0x74, {{0x39, 0x4, 0x2, 0x9, 0xe4, 0x66, 0x0, 0x5, 0x4, 0x0, @empty, @rand_addr=0x64010100, {[@timestamp_prespec={0x44, 0xc, 0x80, 0x3, 0x0, [{@remote, 0x59cd}]}, @generic={0x44, 0x4, "fc3f"}, @generic={0x89, 0xe, "a63caf81a57551b4ec88d54c"}, @generic={0x86, 0x9, "7727bdf4e647a1"}, @rr={0x7, 0x23, 0x84, [@private=0xa010102, @private=0xa010100, @loopback, @dev={0xac, 0x14, 0x14, 0x18}, @multicast1, @multicast1, @remote, @broadcast]}, @end, @cipso={0x86, 0xd, 0x1, [{0x1, 0x7, "cefeff6e06"}]}, @timestamp_prespec={0x44, 0xc, 0x41, 0x3, 0x9, [{@local, 0x2}]}, @cipso={0x86, 0x37, 0x1, [{0x6, 0x8, "b238fd85affc"}, {0x7, 0xf, "df048321dfde59c9d539a8847f"}, {0x7, 0xa, "b8a48af704e204c7"}, {0x7, 0x3, 'o'}, {0x5, 0x2}, {0x1, 0xb, "359b5aec5478d4b254"}]}, @cipso={0x86, 0x33, 0x2, [{0x7, 0x7, "399de76577"}, {0x2, 0x10, "87bc58ee00e303e4a5492b018a41"}, {0x5, 0x7, "fb76fdcbab"}, {0x2, 0xf, "bb5030660cbc6ceff08d308b2d"}]}]}}}}}) finit_module(r1, 0x0, 0x0) [ 302.942939][ T2596] usb 1-1: new low-speed USB device number 13 using dummy_hcd 13:08:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c00010062"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 303.091799][T13932] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 303.182893][ T2596] usb 1-1: Invalid ep0 maxpacket: 32 [ 303.332872][ T2596] usb 1-1: new low-speed USB device number 14 using dummy_hcd 13:08:08 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x0, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 303.573054][ T2596] usb 1-1: Invalid ep0 maxpacket: 32 [ 303.578740][ T2596] usb usb1-port1: attempt power cycle [ 304.293453][ T2596] usb 1-1: new low-speed USB device number 15 using dummy_hcd [ 304.383085][ T2596] usb 1-1: Invalid ep0 maxpacket: 32 [ 304.533019][ T2596] usb 1-1: new low-speed USB device number 16 using dummy_hcd [ 304.623982][ T2596] usb 1-1: Invalid ep0 maxpacket: 32 [ 304.630336][ T2596] usb usb1-port1: unable to enumerate USB device 13:08:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$smackfs_ptrace(r1, &(0x7f0000000000), 0x14) 13:08:10 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r5, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r5, &(0x7f0000000900)={0x2c, 0x0, r7}, 0x10) sendmsg$TCPDIAG_GETSOCK(r4, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)={0x468, 0x12, 0x200, 0x70bd2b, 0x25dfdbfe, {0x0, 0x4, 0xc6, 0x3f, {0x4e22, 0x4e24, [0x5, 0x1, 0x101, 0x5f0b], [0x4, 0x6, 0xff, 0x800], r7, [0xffff, 0x1]}, 0x800, 0x7}, [@INET_DIAG_REQ_BYTECODE={0xba, 0x1, "afa055b412c53da6cd1f8316b53230b459e6a2220152f78ea7d762b43179b5e9363e922f65ff510736d9e832f27bcce253bb062ec8da136448ca60b31379de697744c9a680b5e458d7a1a782c217236a8cb588b9dfdcfcc9af9809e83c386fef988cfd32a1310f2581a075dfa1a60affc409a099d1c85e1328b3272c8cf264c3e59024d4c8e1201d8744a9811e01050c4225f10775c257bbc5cd5cd612ca12fa3369b5f46de0819115d3ce8e178d042676533280d2a4"}, @INET_DIAG_REQ_BYTECODE={0x103, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xae, 0x1, "e66adac17fab43d2ddcce00a68d2f49dfbae664671b36e44cde0d8cb19b788e3c27571de29956f3014263e65811728ac8dd96f5dbb56f5005d747c7483afb9da94d71ff07df3a0da61f8e293d06936b4ccf45932f91b863ad9cc14f2aaca3a79d1ea85b2bbfb53b8697d81d3e5dde208c556cea1ccefa3f3988b8128e344a1605c4f9d81cc52e819ab9124902002d01fa65f2dfa8a00089005d7f938fd8ef1ebc944f56abd4d4c3e9ea9"}, @INET_DIAG_REQ_BYTECODE={0xb9, 0x1, "1633c73665e9c4622dfa35febd12cfda7eda3c13b13015b32d8dbad4a5eb0cb09b9ee0587c776e8f06aad77d3cec1609c1fbee06e9e7b07a3c05be9819a30749160636e76e0f1c4125888295966f90c3fd70b3d2bdaea609a65dd395cd1b5ce24b7f3ba21f92d4f7f90a58d26f2bb785c1d07747668f3ab3ed4fffd9d026f9add5c9eb3336e55b3d8ceb3909787b4b9161824650de4c6cc9ceeb8b0a79aa260d0d14a9c45ed207c69861a972e74e73d462928816ec"}, @INET_DIAG_REQ_BYTECODE={0xe9, 0x1, "cfe7fec3a79d8a8d8a049164fce77762b39260d3b4d8b36b4937966ee1b314ee9ce60f7d07e3f235ed078c92771f11df01b9dfdeb71a127775a7597f84f31b0aa66672525ad595837e5049786e282e79fdf51744a56c743f6e1320045acf2940dc2b34937be802589ba11ca56fdb5302e36186b5e8cdd106c77ea4d0e8e257bcaebf8660a5eb667c94850802425fce049e27e9171810fa749105f9da6346aa90aa2e325b3a9a11cfdcb297f302d0fe36dd4ec3b0ccfbc9e94fc9e438cbbafd68da7033220df213d505203f24bcae6e46385465b54604e13b31a0df01fb83e912ba01af7b89"}, @INET_DIAG_REQ_BYTECODE={0x4}]}, 0x468}, 0x1, 0x0, 0x0, 0x20040014}, 0x8045) 13:08:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c00010062"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:10 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000000), 0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000380)={0x0, 0x1, 0x10, 0x2e2e, 0x9}, &(0x7f00000003c0)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @remote}}, 0x7, 0x9, 0x8001, 0x6, 0x1, 0xffff, 0x7}, 0x9c) writev(r3, &(0x7f0000000080)=[{&(0x7f0000000280)="18e7b164af9352a84195e34d80c0ba223c3c984874dd91a9723c6df00306b7f8ccbefdf9060598f77bd27c68f2167bf60967c090cb6cd585398fec8c57bf1c30b8d64d00fab079dfd12d7f7e7872e1ec47c36050681ad27f7e0585fbe4ed134caf774466c69449e5f408259a74c3e3bd08e3cc6eb17c1489b30e7a852cfcbefcf4bb53d0973cdba6bb91d329", 0x8c}], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) splice(r5, &(0x7f00000001c0)=0x2, r5, &(0x7f0000000200)=0x9, 0x1000, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="a198e2513ff49d4d", @ANYRESOCT=r7, @ANYBLOB="9d35b8d75b8ce6ede0696c608ee80000000000000000", @ANYRES32=r5], 0x2, 0x0) dup3(r1, r0, 0x0) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./bus\x00', 0x0, 0x8}, 0x10) finit_module(r8, 0x0, 0x0) 13:08:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x0, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:10 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000080), 0x1) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0)={{0x96f, 0x40}, 0x10}, 0x10) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) [ 305.726162][T13957] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 305.757167][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 305.757177][ T29] audit: type=1804 audit(1595941690.810:237): pid=13959 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/182/bus" dev="sda1" ino=16369 res=1 13:08:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:10 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0x3, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r3, r0, 0x0) finit_module(r3, 0x0, 0x0) 13:08:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000000)=""/6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$fb(r3, &(0x7f0000000040)=""/235, 0xeb) 13:08:10 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x610000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) [ 305.979370][T13980] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 13:08:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) write$UHID_CREATE2(r1, &(0x7f0000000080)={0xb, {'syz0\x00', 'syz0\x00', 'syz1\x00', 0xa3, 0x361, 0x5, 0x2, 0x1, 0x1ff, "caac8933a4cd3b55fddcf5362e9892f6d57b28f6299f49f4a5f3b1c65fe6792bc5a72a131da8fd93cd83cf3d577b2ca64e56f29ea858ba2a52e66795e341ddfcc9fbb536c15feb067b7a85e8d97c7f87d102e2fae5d429d7576ec63bd3092e036f32128d4ba977c90423d6eddd5fd321114a12f7e796096b14139c884c150b149dd82eb9242ceccacff3659013faa3eb884896585e069e1ec094bd1a7f5e94f1fd88cb"}}, 0x1bb) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8100, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff}) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r8 = dup3(r7, r6, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x7d, &(0x7f0000000000)={r9}, 0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r9, 0x5}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000002c0)={0x2, 0x204, 0x400, 0x1, r10}, 0x10) [ 306.029625][ T29] audit: type=1804 audit(1595941691.080:238): pid=14004 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/183/bus" dev="sda1" ino=16371 res=1 [ 306.046104][T13981] 8021q: adding VLAN 0 to HW filter on device bond51 13:08:11 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)=0x400) 13:08:11 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141282, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) [ 306.140161][ T29] audit: type=1804 audit(1595941691.190:239): pid=14027 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/183/bus" dev="sda1" ino=16371 res=1 13:08:11 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='Y/\'\x1b\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000100)='{\x00', &(0x7f0000000140)='}{/$-$\x00', &(0x7f0000000180)='\'\xa3,(/&\x00'], &(0x7f0000000280)=[&(0x7f0000000200)='@!\x00', &(0x7f0000000240)]) 13:08:11 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_RATE(r0, 0x80045002, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f00000000c0)=r2, 0x1) 13:08:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xc6010000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:11 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) getsockname$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, &(0x7f0000000100)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r6 = dup(r5) sendmmsg$sock(r6, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$VIDIOC_S_CROP(r7, 0x4014563c, &(0x7f00000001c0)={0x3, {0xc4c4, 0x879c, 0x9}}) ioctl$PPPIOCSACTIVE(r6, 0x40107446, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x2, 0x9, 0x0, 0x7}]}) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ptrace$poke(0x5, 0x0, &(0x7f0000000200), 0x9) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) 13:08:11 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e22, 0xffffffff, @mcast1, 0x3}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(0xffffffffffffffff) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) write$FUSE_OPEN(r5, &(0x7f0000000200)={0x20, 0xfffffffffffffffe, 0x3, {0x0, 0x6}}, 0x20) r6 = dup(0xffffffffffffffff) sendmmsg$sock(r6, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) lsetxattr$security_ima(&(0x7f0000000080)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYRES64=r6, @ANYRES64], 0x2, 0x2) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$FS_IOC_GETFLAGS(r7, 0x80086601, &(0x7f0000000180)) 13:08:11 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f00000001c0)=ANY=[@ANYBLOB="420000000000000000000000000000000000000000f6ffffff00000072000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000f876a149d2ef50b95ab22055b56591301dd205b9e08b387693f06ec6cfed9db85cbadd803735f90c235ba9a8af7cf15ca5de61ecaecdc4e06a19e23e451305f55f2cb52fad7c76e6a9b516b97d9c9d4818ac4fd024f07bdbe23ead5f4c92c0a4e2a3efa61bdda3915ef63df5311529679874"]) keyctl$set_timeout(0xf, r2, 0x45f72e1e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r3) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300)='NLBL_UNLBL\x00') ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f00000000c0)={0x980000, 0x9, 0x985f, r3, 0x0, &(0x7f0000000080)={0x990a2d, 0x4, [], @p_u32=&(0x7f0000000000)=0x2}}) pipe(&(0x7f0000000380)={0xffffffffffffffff}) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r8 = dup3(r7, r6, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000000)={r9, 0x0, 0x30}, 0x21) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000280)={r9, 0x800}, &(0x7f0000000140)=0x8) [ 306.661043][ T29] audit: type=1804 audit(1595941691.710:240): pid=14058 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/184/bus" dev="sda1" ino=16380 res=1 [ 306.683289][T14055] 8021q: adding VLAN 0 to HW filter on device bond52 [ 306.751907][ T29] audit: type=1804 audit(1595941691.800:241): pid=14058 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/184/bus" dev="sda1" ino=16380 res=1 13:08:11 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:12 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r1, 0xc0245720, &(0x7f0000000000)={0x1}) [ 306.900631][ T29] audit: type=1804 audit(1595941691.950:242): pid=14109 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/185/bus" dev="sda1" ino=16380 res=1 13:08:12 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) sendmmsg$sock(r2, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000000c0)=0x1, 0x4) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FMT(r5, 0xc0405602, &(0x7f0000000080)={0x87f1, 0x4, 0x1, "fb65de40de4ce2a0bb4fd0ec666d4d98f28dad9e77adf0240dae625d08353b7f", 0x56595559}) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xf0ffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 307.006953][ T29] audit: type=1804 audit(1595941691.990:243): pid=14109 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/185/bus" dev="sda1" ino=16380 res=1 13:08:12 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4$inet(r2, &(0x7f0000000040)={0x2, 0x0, @empty}, &(0x7f0000000080)=0x10, 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r6 = openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r7 = dup2(r6, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) [ 307.256212][T14125] 8021q: adding VLAN 0 to HW filter on device bond53 13:08:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:12 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) syz_open_dev$ptys(0xc, 0x3, 0x0) 13:08:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:12 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1d, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="95800000000000002e0bc44d85100000100000009500000022000000", @ANYRES32, @ANYBLOB="00000000fc070000"], &(0x7f00000000c0)='GPL\x00', 0x3, 0xb1, &(0x7f0000000100)=""/177, 0x40f00, 0x2, [], 0x0, 0x1d, r5, 0x8, &(0x7f00000001c0)={0x100005, 0xfffffffe}, 0x8, 0x10, &(0x7f0000000200)={0x9, 0xe, 0x4, 0x8}, 0x10, 0x0, r6}, 0x78) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:12 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) socket$inet6(0xa, 0x800, 0x7) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="c4040000a882021b35e68162cbf80000000000008542f4f981", @ANYRES16=r2, @ANYBLOB="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"], 0x4c4}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 13:08:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 307.849108][T14193] 8021q: adding VLAN 0 to HW filter on device bond54 13:08:13 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r2, 0x1, 0x0, 0x0, {{}, {0x0, 0x4102}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0xa, 'ipvlan1\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="02002dbd7000fbdbdf25010000000000000009410000004c00180000000573797a30000000223fa8dc60359999d9319f49c843ee00"/98], 0x68}, 0x1, 0x0, 0x0, 0x840}, 0x20000040) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r8, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) socket(0x100000000011, 0x2, 0x0) sendmmsg$sock(r7, &(0x7f0000002380)=[{{&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x4, 0x4, 0x3, 0x1, {0xa, 0x4e23, 0x4, @local, 0x4}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)="d0bd1517dfb1af8293c6be8b6439e14c55f29e493d91344382cdccfbbb1e1759782bc99bca3cfe51e5e131cc25bc4a4cd6907bdc31702817323f2d019b332991a9aaf5f1815e04658f67d350aadc19f699a077986611826e208d37fbb7fc61bf03e7a983475736a733779ae4adb29c1181a898bdd376f08e0092f769d364a8b25508572a2e6f1d7b3b5512727498196ec78e286b0d4048f947a20b48b6f0f062a9cb1abd6d71ff81fac0a9459d6d9086709868a92a8e86d5c86960f8c4259d78084005ddae89f61cb94222174adde07c296366009f9fb12e37a0ebbd9bb8755ff558ce8860fd5d7e88d5b1bb26110c", 0xef}, {&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000000400)="cd3b5eb62533eccc8e589f9441b50ec63a34473cf024405a2e0313a69ac6628a41ed91a3f014cfe569799529c0640fb170c0f855c6084bd44d9fdf881f7400e4fc136ed301b23092346db647a83fe77ff69a24e6d38b3885729bfc842a2dd39ebab28cbf8a5ceb8f1946cd54eb7cc15807a0a071438ea3857fe0a5063131b6c5b54d15abccfd9bd229524277bd205f3c20cb106b79f44909225077", 0x9b}, {&(0x7f00000004c0)="6644358078f101273d5cc3a2005a91420aae7e707f0d30ffd9fe531f1ae17bc92ac25e069bc0593e065710aa37333832bb7acb591bd57c691dbcba4f56e8b1155eb7c13c346196cc1d852c19659063b612634e28f2e513845a25b5c5d81bf576d060", 0x62}], 0x4, &(0x7f0000001680)=[@timestamping={{0x14, 0x1, 0x25, 0x10000}}, @mark={{0x14, 0x1, 0x24, 0x101}}, @timestamping={{0x14, 0x1, 0x25, 0x22f3}}, @timestamping={{0x14, 0x1, 0x25, 0x6cc16822}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x976}}, @mark={{0x14, 0x1, 0x24, 0x6}}], 0xa8}}, {{&(0x7f0000001740)=@vsock={0x28, 0x0, 0xffffffff}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)="bb02267519af42be2295", 0xa}], 0x1}}, {{&(0x7f00000017c0)=@ll={0x11, 0x16, 0x0, 0x1, 0x6b}, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)="5f1458c60d87c43d9a2695c3649ad2342f31a6c8361a67859e163b84fd2406163a96dd69aace0866ad2d6a4a73119f956ea0497d3d08d23b095259b8fc9a204d57341035de5d4dfc8bb00ddf96a148bbebe979b41e6485d713460b6263ba3700dd0aba129296b6865f34fceaeeb85f3dad3b150f3bf3ee0a4de6ef7e351e550a180cd17e5ef51d36afacee19f2cd35228c0bcba6a3c1a9daddee1effb6233cd9e4aab0b2a3ce421fa3154f70eab10c19009abd064c530eeca5e6c71976ed70b5f88cf6776fa758b09c", 0xc9}], 0x1, &(0x7f0000001980)=[@mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x7}}], 0x30}}, {{&(0x7f00000019c0)=@nl=@kern={0x10, 0x0, 0x0, 0x40}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001a40)="77d2d2bbda363fb329457f9087023a75e97b6ed84937eeb514f1e38d84f535565a7151b0adc3640a818d0c455ad1dd99b65fefc41dbf975339415e7b5ef065", 0x3f}], 0x1, &(0x7f0000001ac0)=[@txtime={{0x18, 0x1, 0x3d, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x7f}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}], 0x90}}, {{&(0x7f0000001b80)=@qipcrtr={0x2a, 0x4, 0xfffffffe}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001c00)="30481929f60492c608bdf7b4ca39960507ce8c03dded22c2bd06b89e569a97e74c16cfbf883fbd8a47a641465f5f187e7c195768091e7c4eb8af55a39d066864fd", 0x41}, {&(0x7f0000001c80)="e04c1a360a2915aab008a285736d22ac5a33df061f26a3807c32fdb0c28b1cab3cf539fc03d73ef39ea7e1301a8276a2f68ec193409edaa462bc9a9373ae46162cb8c9b12a12534477a97bc95f992e783adba9f1cd520456777014de19b5be7a8eba20e1120f073d65c46cd26bf6fd8ffaf6e70d730f0289031f3b740c3a70815c33125ab55f5ffee3cb9404675857c009a56d529d48d5bc7ede8f299a577ff848ba2dbeec7b89f1e139e425f4774e03791373ef7bbbaac1b146fc54b779b3357f5d", 0xc2}, {&(0x7f0000001d80)="c2c1cace74f97f056de33fbeb9692d993ced295b9370b1", 0x17}, {&(0x7f0000001dc0)="a23e62ea47c8d4404e7bbf4465efb2c3fc29d3b3cf2add14e190dd9d2151b722a9c1c11b166f060789b4d3e4c5b2fa70f6cfc0e3bb7ec515fe236527070a4a8169b8bd97993e2003ae3a8ec4936748ea50a726e4f25c41857909ade3d41e25cf5c9174c3e0e94ab6e676e11a90", 0x6d}], 0x4, &(0x7f0000001e80)=[@txtime={{0x18, 0x1, 0x3d, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0xfff}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @mark={{0x14, 0x1, 0x24, 0xfffffffa}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x10001}}, @mark={{0x14}}], 0xa8}}, {{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f0000001f40)="579be357136dd47d28088f807a8fe3cdbcd670c9b43d3f24175b6437c8a45beebd5b73eb8d12ff7d4425c1fcf5b162e5758ebfab7200ac4e737ec467cab552fe3eaf3cb98d05577d00b0e0180bb74d04643c184001ead58c72949e6385d3e943232c7a92f8fbc8a8f82c53062bd54b3bb607dbbd4404a19bab1b6b68d3d7cbc4dd67594a8aee72c2e662c1023ef4f88cbc3594f9b3671478257bb475ac14150ecb2366fa6286eb79767adf38ba6a2ed5964d5f56db7f54a0f6be5948d17611a93607738f65b12b989d88e5d9222c60ee758dd87b0ec37c903eee53edde461875", 0xe0}, {&(0x7f0000002040)="3f1f7cb5c0fcf75067b3a3c0aa95e5d1507641b1f3d128b3e103dbd56e3de395c903fba8aa2c20ad4adc9c2b4257fa917118a7ad7258cd6b4b1a0e029114d3", 0x3f}, {&(0x7f0000002080)="656852785bd20db29203f51d36964e957ee052829b9d3110d4cb17a3ef1c7acb5312bb56b1e388d39c2048fccda933a09b78678089b4005480c38774e6994c525ba035eb70776af8893a419be43520004b98107eb4aa32955570a2bbae5095ea02f01d259dfda54cf8cc4213e1e06cbe7a6a2e6ca71408ff92ab7240f2b5f1c2fa7fd639ef4a286e2b1982f10be220648f2027", 0x93}, {&(0x7f0000002140)="72a86bd7bb43398cc140224729e04439198d3666c36d3231474235dc08ac7f18c276447e18111f4e9a9724328297c7a327d1a4f912e5ec3bff22dbfb7ad5fa1ab58ebaae0a2cfe9e8ee7107fd1f67f6241a697421e588d8bbcadf658e92fa5295b2db0ba5012b48c0635f990f8293f434c66abbeabf007d848d42a4bb5f2d66cf15aee053d6c3bcdd0e062ad878930a1c845f3f5047077b91b1f9d413ecbf9ac4f99947d78e4df24bda07419a16f0f092f8f374e805ee5af4d899280b7904fa7400e5477f79c0ecfc23300c9dc363fb0a0e3f73be5", 0xd5}, {&(0x7f0000002240)="c2959750649be904c75a9ff70af2509b6e7215f76adf4cbf1fbf4d970fae5832b6dc9886f16ad853cffc576f3daf6c9eda1b2c371853b9a60148f3a78dc31ef6d0c5e2bef3454cad0cf158fb432ac67cbb36b5f7c26a6e8157", 0x59}], 0x5, &(0x7f0000002340)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc1}}], 0x30}}], 0x6, 0x40800) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000180)={0x2, 0x5, 0x0, {0xc82c, 0x8001}, 0x4, 0x7}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x20, 0x1) 13:08:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfa030000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:13 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:13 executing program 0: mknod$loop(&(0x7f0000000040)='./file1\x00', 0x6000, 0x1) 13:08:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfb030000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 308.611594][T14266] 8021q: adding VLAN 0 to HW filter on device bond55 13:08:13 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 13:08:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:14 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0xc0000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r1, 0x406, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0x1402, 0x300, 0x70bd2a, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r4}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r6}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040040}, 0x4000) 13:08:14 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, &(0x7f0000000040)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_CROP(r6, 0xc038563b, &(0x7f0000000080)={0x1, 0x0, {0x6, 0x3, 0xfffffff7, 0xfffff04e}}) [ 309.367774][T14340] 8021q: adding VLAN 0 to HW filter on device bond56 13:08:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xff030000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:14 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x7, {0x4}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:15 executing program 2: r0 = open(&(0x7f0000000080)='./bus/file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'syzkaller1\x00', 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xffff1f00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 309.966324][T14416] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$AUDIT_USER_TTY(r1, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80021100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="c4000000640420002cbd7000fedbdf2572ece64ac817815c6b46eba4f231a93c768f0095f7d198ce4f317a56f55fae8cc402c68e8ff7a67cb34b2514aa1c2a60811bda4361d6cab137e36a34b26769f915b8b6f5dfe1f903a6b3b21e932627d812adfa992788bac8b3db9002d0d18a5eca5661aa781f537d7fc000949df1eeee32af15c8630d89c4826643475cba93ba463a3d3eacbd9ef592e66dd01962ddd14f2720cb33c5585a0a0d1a8fca33f327a95a24a6558b6801ee319643556d004014e12976e9cf32b84fd0473d513f0000008e9154d8c73b745444024610aced81656edc74278a8264892e5e155e078b0eaadae0f1b52f3fb0d03915dcfd20b579ec74525e9d12698fd1fb1d901522c11196d6b8db66625d4a88886c8070b6c3fca800cdce8442e440049f159db57355e74ddb5341474f5c0d7bb84d0883a0176754a3ca104530aeffc11bb08030d3425582808f655f4e78d90beba7032607c6b71c93add243c03688498145df3c3175dc2956d2f1af30c87844bd6673e89ea0c744ac366ef88f456c4e30acc92463b6807d7a28"], 0xc4}, 0x1, 0x0, 0x0, 0x800}, 0x20000800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) syz_kvm_setup_cpu$x86(r3, r5, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f0000000080)="f467660f001764660f383f8706000000440f20c0350b000000440f22c0ea74ff7fdbea0066baf80cb83cd90682ef66bafc0ced0f011b332bb93b0900000f32b9500b00000f32", 0x46}], 0x1, 0x8, &(0x7f0000000100)=[@cstype3={0x5, 0xb}, @efer={0x2, 0x801}], 0x2) ioctl$CHAR_RAW_SECTGET(r5, 0x1267, &(0x7f0000000240)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r6) r7 = dup2(0xffffffffffffffff, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_FD(r7, 0x5, &(0x7f0000000140)=':{\x1f-\x00', 0x0, r5) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/107}, 0x73, 0x3, 0x1800) [ 310.089403][T14416] 8021q: adding VLAN 0 to HW filter on device bond57 13:08:15 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:15 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000380)="6630ff79106b4017a0c46ec53f4630c0ba667c03775b33c5a9ca4222ba1878bb939e7e6dc4a54700d69b0dac439923962fb439473176714a6525c72932cecb58f804d76a38ea56cf2371f2560ec89c4f7a", 0x51}, {&(0x7f0000000080)="6c26b893ed0350af517692012be874842df9425da482d5fdeaf2d4328b6033967dee5c16bd5e35d4cd15f6dd7d83260b137630fd5c1056573eb2078be32a64edf7292d961894ed6949958487ff0bb1c9f4aa61c875b4c9a47afb83b8803214e050940e9bafc9baf6f89b670aa24d4a8816265566e3b6efcd4016319d6b9fcba2ddbca6e4fc4e61bb4b2ace4f9c5b8c5304e08cd3d66f27d6070134a36d7088996590eb76c8a5608123b7f35e0b06c06ad1537527c994726f9227becd513950be45c076effe06974a8b575296628620e9", 0xd0}, {&(0x7f0000000180)="8d7bab308d8f2ba4d1add726f494073a4c031ec8dcce691965e9f8811e7fcb4899be37d84e53b38e9bca7ef4697683096878181e38a4c88d7e7859a90428310592681db73258ca60a2065b5a0a437abf878ed6bdd12f23f9b39696825e031b85f840e3b73a69c3925f6566f956dbeab7ffdc8322f4b5cd1278a3a9c1f7389b1f", 0x80}, {&(0x7f0000000200)="35feba6ca1b30eca1359", 0xa}, {&(0x7f0000000240)="95b93236bf42a156eeb7cf11d06c89112c939e0be7d929747a093c28b1ddcb27f195b80afdcec22a620e472b375831cea1f7d53ad0c9a7d3589bd1", 0x3b}, {&(0x7f0000000680)="2042630a4a5f76019e811473386b3830cc236ce34c8d9152eb6011e3f4c97433c4a3bf73b6833925c3908ec954589af9e6c9670d77770dc5d1b30a4450cc38b303d2264149c7f6c6ccdd21a6432c198bbda8c91b77e2300c8ccf3a8a7305611261bde2d789a7985b8b838a376e9e1567eb20573abef5a4a892966d9fb37e3645dbf88384fb5322278bcc419e203016b671ce06aaa5971528cbbbd22ab948ec2c56a0eb3a884d6634be94686b0cb4fd1ebd031d1c39e056360199fc74a8792d1df12e0c90fbb987744d6ecd9b994f4152838ee0188f2f20b216d3e14feb658ebec89fce8bc873d9fdcf07f1fd2f473b280dc88301eb1048b0d54e0d8d7234236085c8e735e43f84654d2ed2644d9b4a91afe8b818d4eeda72845701478718bbcd3e68d2369d43862cb9f5035e2d7de09b882a87756384c3505661fb2e95f736569fcac5b56e32c23794214f66d1a3d01840d6a8956920cff7fa6f4a922edc91a97733716e7cf805e7ffebdb414bddd7b5878887774af93ac01a58d4c3872de3d5ddda1e5dd20881fcfa29f8f4bf9d7a8ac668732fb489e24dcc5c7918c515c41df1bed2257381657e4131a5caacd8c7b874ef5f2212d6a119c3595ee660762a8028267b353b71841fc47f12551daca15f2383972a482d1251d4f07529f6a492bb110b1cb6d5615f44abca6a78d14969aa44c0e0b14303dc9c8f2f6c58f7862325df0ca50723e0c515c34ef2b74f6a6dbe7f1273f16be2f9f00700539c78a6dc7bcd45a2ea4e93317bc8730ed158588545de6bfb7142851cb0a134fe3f87df5aabc27abf3f806052867ab96f425acc4f672541c29bf03ffb690aedbd21bcb8f2f05ba4e1f3f5df216d780fe383fd670c5ecce317befb0d4bf14711ced00abf119b5847fc3efa841efe50a822291c2227ca9f44e896d4dfce53af056d48c0f7517d5deca9bdf6aa4faf2aed03bd44dea082c6bad94907a38ef24d7cbc18d00dea287557c7e9caab322c9c4d91cd8575dd16a07f60392be01a17b5311fc5d454f27d57a707927e6a559d1e158e95590d5b048a18b5c14dea892b007df424c0be76bf4a2ffb69ffa9389b30f89a780cf4a5e128fc29dee77a17c7afbfc29a307c885eed8ca36fabf356475fd59cedecb9f96009ad5d311a6f45474fa9c2f936e7174ee5adf7c4e41b82ecb793322e87c2076773467bab50c91028d48847e2777d2cd42f0c76a6da74a54998dd510abc0649a2d913bcb5e2cf52a5c47a566b9bb9344bc69f1ab401813a05e74b70fb4dea5a9ac6dfbc5fc2bed5745f4cd7b7205279c69565fa57c996176374ff6c3fec90109153058113ddc6a24a1e757f3299d68718b5382855410d8a8edd29bd07f6a8c371b1fcce11e2056b4d84711019fa684bbaf0bfdc3342addc1440ae25de634fdeb8e5cad6bc1b60b721f9982d54ab1d2a4cc25c3e2843b369ca5da548a0fc8876ebafa9520d40a0c3fbf58fdffaef3774cd07a43264506c9adb47c115e047d2dcace284b7ec9cbd452b37d4fe92917e750b6b266333927ab4f112ba229443a0915b0fc65f3ac7c1b7121c23eb29b5abe8e774194d9f8b15dfd376c73f964de53bace7a2fde289d365ac49ec7acab1998117e77bfe0b49134b1a19d34bafc321fe13b7c2105c3a1e32db3ae68af7dba8951c14861f3dbf14444f2ecf8f318370b99e075700eb96c5ff2250322028f7df816c3535f977f2fe331b5902f97d99a63554fcccf624638dfed29fabf9c7c607441bb8ad3ac9960003bcf6a79a2c3b2133ebffd856b01211008b1aaef6e6d6b4cc3ba48f88cd676a0fe20ffd5572334ca0f1079ca645ccd2a6b64619be19aee6b1ec4376921db872cd6048865c6470cc4d154d68de5e446a834f0d6687ea3439503353ea173556f25a6340c66a589fed83ff2321e8b11e1ca6b46f07dee352b95fdb8b0a2f5ee4ff5ce80bb79bf71e5a8c10e49df73419a3dd8e9339617013d54428398b11a8d6e01ac582e5d96683abf98ac445ad197a8f5a9ac4dbcd8296da6fe4c0ae86f478bc0ae96f6c1412bae30f096290316f06d03c19d875b207aeb044e9aa7efeda603b0e9800a23cdd2e40815a80f2eadb4645a4f896b06d9437cef2fbf31681f8a69d92e51d10a747b221a10afb750dfc876b756309cd5ebb7fb4e8c850fa301f472a74758a87ede276e645204126a2659309b42e588f2fef49ba64552930f1e853566083e00420b4c1715862e81188742224bf52d1599f56cdbc873ed52a9b200b207fc4fd3245ea3913f235fe29a632960e1454fb6e1a1576ca39465c614a2c6587e6035ab7a8db6bc9a50f85de186fffa7fb5177eab18b2e922893b4170248a0b47e244fa819a943ef8126adf177ae661c0b529981786be5f9b665b1287840942f816d55e66f102227367eaa1fe84eb530cf260c5a96c9bea2ca8423b02fbd85e5a3b3e0170bffece95d2c8ba86188aec6e858847a6cee77af5869d67efd34ee915fbdcbe25f30b636e1a9be0373bc16d879cccba80882ef483db6911ab2cd11ccbaa33398fee22b3853f02050e5c6e4474dc5a7abafe5c1f7527b563a9d9564c6250e30510dc9957e0f60221f5454755128002fdacce7bb058d111023db1e7425e0b6f96c86da7800a787172bdbae310cac9a72f4181b9f064e96c586f60d9da6f0235151e04d6116bb40e202a716fe0b3e2d1c18d057c21cb5e88517fbd1e2cc0744d7d34f22587ba875fc927547b224038b8bd6924ee39322d511c427cda1c07f4c1803d9175868f8d98699da965c3ae3f07434c9c2ca8203c189d97ecc4e1218dadda851b4244ab3ae221be44960637337ec42881fd5301296b79d513868c98b6a3d5de0f099713a1cae849878c4492c23989864f50a251aa25745f8eb7920c1e839e0bbc266ff52a046c38ab89d4de59318e59fac927021fd6f1e2a4601f3df4d68e489de264352d26d4016e3da08bebbbe9de64497877a0277a417fbf208374610d6217e085d1089871d206389e989e9835727058f61c9f881474b22d8a681372160d68f02e42790bc68ec891752d449b381402908c66ce570d3eafb6c5e8f1e313ccc92c81a7e9ef90d8c1df5a21ed89d762a1cdfdfba7d9f97b3816731e801bed0c1cc61d5c921feb8f7bddcb5157bba321850e292af553bd0c5401e433e3da81c0f348b6f92889fa1497e744a638fc58f3380474cde68c6246385fddf88c2df06ebcb0e5757bf882e4cb754741b24ebb6c9c6e94fd6eb4527c42ca745b6820a08a9871d41a4c5c13f93ae1b4847cd42cfaa7965308375517680109e4101c5aa24e58c96ef9cada6d1a6d80ce94b63c8d4d2008e7eac29516a7504753ac5899d1ece9c7b78303806ea602ed36bd402ee185911c64613a1a43aea322f448dbc82813a533de251e948670d3069266c28e3d145988755607dcb5afe50503d61059ac04ad5a717278e05c528604c955ebef8fd248897562c8fc2d52b0143d55818442351a21d8767d1a97a45e58d14cb5af5d7ec60d2b06b8fa7f5c59563ccd966cc9a807a669dd39157e3e6c44b5c705a557873d151405717a09b722b4a7b8e3b6314b28bfcefc1dafa3b6b16a9016a13997254cf5f312c6883affced78d3c03328c5ce212fe2295d8520be21678b362bb6d4cb730a20032e9e400ce2c0342325769484cec318dfa59035c0e1741178ed083243bbbca886544bf8090fa1985489c1a9c56c72c89b5badeae3394ea25e5e220214d9c2951a887dffd6d94e95540ee2a9dbc01018e75a642ef2888014d7a5a2212eccc45fe0c10772ae0f234974d40d6caf6bdcda28cdbee13ed9590ff81fa38105e15d211a9e321dc01a6883dc6f951a7c2ce5a8dfb3ace238b5ebccbfdb706c28e004e67fe918f59d1e8b0e4bedbbcc67ee45fa4028f7947fdde738168de70cc48840d283446442de5322da7aa297220a3ceccfdf51252cb868cd69542bb18d31926bb66d6172aebcd347910329e45a3eb6a428522b217a6cd8a38d4f7b664115b0b4de37652d4b60dc65a5c8de48c60956e39ca9a3cfe7be802c24c4e8b4a915cb1aa280a6caf4bbbec0fcd357f4f3fe511314670e8297af5d83bcbd403f8a6faebc48b4e08372168a7f04246967cb8a311a675adcc811adf221966396dd8c2340f1948e38d0e53f90c981da81c987aec4bc600c8692ae4bbbf96ead3ca8e06d3de98803793834e5b3131f99963e711d80598e5a2189934b94853c86cb87ef2b4372f94983ed971467f97889415daac066c255d0c85025250745f7372ebe0065ee44a5770b83f5e4d01a483db14d32e26ca0676188098da22be9819973a0bbaaa293195ea126512dfb3d2581994e03304e1ad38717dcb79349e713ecf900d1ba116610b7fa21e70fd0a57df41c16e6bb7c4e876f8f49140fab38d6ff1e56bc985a973ab4493e421309fcba5f27fd673512bbdc7d7be1360a64bf2a106cca49c25d833f7debbe7f85283144f0e5050dac9e90e5a63a0141947e15b530db3d323f94521d95f91dd4f46e2745bbd92b625ae658d13a1e6e90c6b3a2416fe2b40d436b6c43b4587e9bbded534df76ee56e4cdf0685e4b1631b6e3356727ebb99524be0167417d720606c992ada4a687562af3b5b5a53aeb2e01f947cd01d2b638b7784c5a217d83bff354950b9cb449a6d6c41c86c7336ecc1cf3ddf1368e1325313408dbb0694a5caa70aafc5f02e8d1ce8904a73cd0b835f0618c8fd01f10677e334359abca00c79d61f573201a7c667bfff0ba739ae8ea0c4f708bb0adc28da6ffc4fd1cbd4d127683286b378974061f9852a768cd975f6aae07351e611b42ff9a1c8293def299e0952f6c354f4c709ff6785d56b9e662b5729b681bf56261bbd607cc84bd485611df923de9379a246892230fbc165e1db552092eb2e7083412d7589d9770512294e86b0769963d6b35f567fd45237f02ef941a9118d36f9551c0828ba6567237aa6ed387bdbe586238365477151dfe9cd528e308e7128f598a3a0d0ea922393f271e9165652e7b3114f33e5d229a98687ba2eb7fdf5742408aa56cacbe6ab6ad275e25c78aaa65250d36dcfe8dc8f27f05f2d473590781db85f5a8994f6bba398c6ff91513e5e9cc6dda58a06620dc632801b178f61bfa82b5604a583b2bca47370df40466c580e0b461064b059d561745351b320261952eb048d9e8818b32aa3f2e806f4ea3514e57d147450401aa7bde7f165e3bc55c5811a65773dd08c8576fbfda7ab9dd53ce2970be8ec5794e8940d56cf23fcea353aa1215de545ffa7f4e551dbf2122bd7b953e9510655583b1d8e0eb1c0e364ac9910e296fdbf10b676562b869af69344a6f3adeecef466a9b7f8bca369571818c5b7d683dc6a6eb3dd3c79d3eb689c8a507ffc710a0801b45aa6132b853907f4f67dbb779a2aa74544740e7baf6cdbe370e7b0dbaf7c4ac7d806cb54db3343f89d30eae1e6c0fcef948a8a07929e05dbcdf4bbb5dc42a99cc32d43d0af7ca2ea134ba348a1de9e0cfb7bd1d5e3d3fb2d146d1e7018b99f7d73b14ff2a8279fab224cd4cb6a45fea0087f0217a44eb4353a7b4e006c949c1330bcbae607e6f0acf819b3ae30f14d937ddc3f24668a82bd8581260cb1ec5e2d4a6d04b8b187c6b0acdfe6ddb3c029bc51c6940948ba3d4c2ebfcb98eabebbf652d558a3c104c75bd15b1b128ff57ff6456f85d105b4aa6dab0196b8019b253b0e9f0cac46f01dae0207707539a279c8c6b11c9a37e2f95fa2e8e8d244414c4a09fece65025becddb8c508d5e80f1b", 0x1000}, {&(0x7f00000002c0)}], 0x7}}], 0x1, 0x40800) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000040)={0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 310.669571][T14486] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 310.716234][T14486] 8021q: adding VLAN 0 to HW filter on device bond58 13:08:15 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0xc000, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x280800, 0x0) write$snddsp(r0, &(0x7f0000000080)="a95d156282875790f6fb949650db3e9d5073217fd00eb34d5699dbf610ab1e71232810ff06a2f5e84e15201a6d0d5736001925bc0568b73883ff51d968ad3528fc260d83030a5b9e8c1aea99ac2f20d55a638b8def4240effd4c7057da23f5c66c8874fd092b2788ed1a7eddd2bece6d53c0acc571df20f62e88769f997f03fc5b157c9835fe260cd5210b127cef4fc879d6f796a5bb476fd7a4e6f49919ffad627ee5219ec7b7574af064627207093f53a5f6", 0xb3) read$midi(r0, &(0x7f0000000140), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) setsockopt$TIPC_GROUP_LEAVE(r5, 0x10f, 0x88) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r7) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x80, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=unixe2none,lookse,access=\x00'/47, @ANYRESDEC=r3, @ANYBLOB="f39712e9747569643d6c3cf5fc4d240f85e7c31c090000000550c719bf82a74e6976e9292bfda7ce7b8fe7e555ea474241f4941e21b1ba8f", @ANYRES16, @ANYBLOB=',fsname=/dev/zero\x00,\x00']) ioctl$vim2m_VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000140)={0x8, 0x2, 0x3, "267e28951de84484d9d40bd562120132ecdb4f696edc9acc5069272b608a1071", 0xf020830}) r8 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400203) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r8, 0x6612) 13:08:15 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x800, 0x2800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = socket$l2tp6(0xa, 0x2, 0x73) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup2(r2, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:16 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) pipe2$9p(&(0x7f0000000000), 0x84000) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r7 = dup3(r6, r5, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x7d, &(0x7f0000000000)={r8}, 0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000080)=ANY=[@ANYRES32=r8, @ANYBLOB="570000005cdf809dd326f609b43cece5148088cce77ff344d33ff2c9e0874ca9890de7198ef31c62e4505953ffff08518ebfa3f1ad6a9371d50a887627f7cc7214b5230c9ab8d11f2b2f9e6d4127dcf4d230909df32841d78b0c65"], &(0x7f0000000100)=0x5f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x3, 0x87, 0x0, 0x80000001, 0x80000000, 0x4, 0x55958be6, 0x7fff, r9}, &(0x7f0000000180)=0x20) 13:08:16 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) socketpair(0x3, 0x3, 0x8, &(0x7f0000000a40)={0xffffffffffffffff}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) fsconfig$FSCONFIG_SET_PATH_EMPTY(r5, 0x4, &(0x7f0000000040)='!\x00', &(0x7f0000000080)='./bus\x00', 0xffffffffffffff9c) getsockname$tipc(r3, &(0x7f0000000a80), &(0x7f0000000ac0)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 311.121596][T14548] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 311.194236][T14548] 8021q: adding VLAN 0 to HW filter on device bond59 13:08:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:16 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141043, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$hidraw(r3, &(0x7f0000000040)="b72bf190227ed63e0a7532f500a6014e2da543655efd5d17b422584b7f2a18433e48a21e96909bb939d5768f38437fd35294b8d27d9da49f6d0977f625bf3a36127c7dc85a61f490463910969e1f93de4e84be0076cf0f62bcda7f6c56403cd50465", 0x62) r4 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:16 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) 13:08:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfffffff0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:16 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmat(r3, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) setsockopt$inet6_MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e24, 0x0, @empty, 0x5}, {0xa, 0x4e24, 0x10000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}, 0x4, [0x4, 0x9, 0x401, 0x2, 0xb80, 0x7, 0x2, 0x96]}, 0x5c) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) [ 311.710745][T14616] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:16 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U-', 0x4}, 0x16, 0x2) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r2 = dup(r1) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000001400)='!@#\x00', 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x298, 0x1) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f00000013c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$HIDIOCGUSAGES(r4, 0xd01c4813, &(0x7f0000000140)={{0x3, 0x100, 0x400, 0xd89, 0x200, 0xffffffff}, 0x143, [0x9, 0x3, 0x0, 0x1, 0xfffeffff, 0x7fffffff, 0x7, 0x40, 0x7ff, 0x44cc, 0xeea, 0x0, 0xffff, 0x4, 0x4, 0x1, 0x3f, 0x100, 0x7, 0xfffffffe, 0x3, 0xc66, 0xb8cd, 0x5, 0x1, 0xfffff801, 0x880a, 0x7ff, 0x9, 0x4, 0xa871, 0x3, 0xfffffffb, 0x8, 0x2d, 0x7, 0x7fff, 0x2, 0x401, 0x2, 0x7fff, 0xdf, 0x8a60, 0x1000, 0x2, 0x1, 0x3, 0x5, 0x7fffffff, 0x2, 0xbc5, 0x7f, 0xffffffff, 0x5, 0x4, 0x1, 0x2, 0xef0, 0x100, 0x1, 0x9, 0x1, 0x400, 0x8001, 0x39b8000, 0x80000001, 0xd322, 0x20, 0x1, 0x401, 0x9, 0xffffff7f, 0x2, 0xb39, 0x261b, 0x4b, 0x1, 0x5, 0x6, 0xb7b, 0x3, 0xa84a, 0x4, 0x7ff, 0x1f, 0x7, 0x7, 0x6, 0x4, 0x7, 0x6, 0x6912, 0x6818, 0x5, 0x7, 0x4, 0xffffffff, 0x1, 0x6, 0x3, 0xc2, 0x3490, 0x8, 0x1f, 0x3ff, 0xb19, 0x1000, 0x1, 0xc304, 0x6, 0x200, 0xfffffff9, 0xa1e, 0x1, 0x40, 0x563d, 0x0, 0x6, 0x0, 0x7, 0xffffffe0, 0x3, 0x5, 0xcbb, 0x401, 0x7f, 0xffffffe0, 0x2, 0x9, 0x8, 0x7ff, 0x1f, 0x5, 0x8f7e, 0x0, 0x1, 0xfffffff8, 0x8d, 0x6, 0x1000, 0x80, 0x7, 0x4, 0xb3, 0x40, 0x8, 0x3ff, 0x40, 0x3, 0xb, 0x6, 0xb, 0x8, 0x0, 0x10000, 0x1, 0x5, 0x4e6, 0x0, 0x0, 0x9, 0x401, 0x5, 0xa5, 0x8, 0x6, 0x3, 0x80, 0x9, 0xd7f3, 0x20, 0x1, 0x4, 0x962a, 0x4, 0x6, 0x4, 0x3f, 0x400, 0x3, 0x1, 0x5, 0xfff, 0x9, 0x7a, 0x400, 0x7ff, 0x1, 0x10000, 0x38b30, 0x4, 0x8001, 0x0, 0x3, 0x4, 0x3ff, 0xfffffff8, 0x1000, 0x335, 0xfffffff8, 0x0, 0x0, 0x5, 0x475, 0xfffffffe, 0x200, 0x8, 0xff, 0x0, 0x6, 0x6, 0x7, 0xcef, 0x2, 0x5, 0x8, 0x0, 0x7, 0x3, 0x4, 0x3f, 0x55b, 0x0, 0x1, 0x64, 0x25d2, 0x2e, 0x4, 0x2, 0x4, 0xffffffff, 0x5, 0x1, 0x3, 0x6, 0x4, 0x9685, 0x8, 0x1, 0x3ff, 0x9, 0xff, 0x1, 0x0, 0x0, 0x100, 0x6d, 0x400, 0x1, 0x0, 0x9, 0xa84, 0x4, 0x5, 0x4, 0x8000, 0x9, 0xfff, 0x1, 0xffff8000, 0x6ed9, 0x1, 0x5, 0xc76, 0x9, 0x40, 0x9, 0x608f, 0x40, 0xff, 0x7ff, 0x0, 0xffffff01, 0x81, 0x400, 0x9, 0x9, 0x1f, 0x401, 0x7, 0x6, 0x7fff, 0x81, 0xfffff000, 0xfffffff8, 0x7, 0x9, 0x6, 0x0, 0x7622, 0xe0bd, 0xc645, 0x4, 0x2, 0xf9, 0x400, 0x9, 0x4ae, 0x0, 0x8, 0x6, 0xffff, 0x1f, 0x3, 0x800, 0x5, 0x200, 0x80000000, 0x10000, 0x6, 0x8, 0x6, 0x5, 0x5, 0x800, 0x0, 0x7fff, 0x1, 0x3ff, 0x2, 0x0, 0x1, 0x9218, 0xa8e, 0x1, 0x0, 0x1, 0x3, 0x6, 0x7fffffff, 0x2000, 0x1, 0x7f, 0x179, 0xed9, 0x8e3e, 0x4, 0x8, 0x7fffffff, 0x7, 0x6, 0x1, 0x7, 0x1, 0x6, 0x0, 0x7fffffff, 0x6, 0x5b, 0x8, 0x6, 0x7, 0xff, 0x5, 0x0, 0x67, 0x0, 0x6, 0x4, 0x5, 0x3, 0x4, 0xfffffffb, 0xff, 0x3, 0x5, 0x90000, 0xe061, 0x7, 0x0, 0x0, 0x8, 0x6, 0x8b, 0x3, 0xad9, 0x400, 0xffff, 0x4, 0x1, 0x6, 0x7fff, 0x81, 0x9, 0x7ff, 0x7ff, 0x9, 0xfa, 0x1ff, 0x1000, 0xb2, 0x401, 0xcde, 0x80000000, 0xd06, 0x14, 0x5, 0xe0, 0x6, 0x3, 0x2, 0x1, 0x400, 0x2, 0x200, 0x4, 0x7, 0x69f, 0x8, 0x8, 0x81, 0x1, 0xd2c, 0x2, 0x3f, 0x5d, 0x7f, 0x7, 0xfffffffa, 0x1, 0x9, 0x3, 0x7, 0x9, 0x137, 0x3, 0x2, 0x47, 0x8, 0x28d, 0x7, 0x8, 0x401, 0x6, 0x68fbead0, 0x1, 0x400, 0x40, 0x0, 0x6, 0xfffffc00, 0x6f59, 0x0, 0x21, 0x8001, 0x1, 0x600, 0x1, 0x101, 0x6, 0x100, 0x81, 0x8000, 0x7, 0x3, 0xfffffffe, 0x101, 0x3, 0x1000, 0x8, 0x10000, 0x3, 0x7, 0xd7c, 0xc4, 0x1, 0x7, 0x3, 0x1, 0x7, 0x7fff, 0x2, 0x3, 0x1, 0x8000000, 0x1000, 0xabf9, 0x4, 0xfff, 0x7, 0x0, 0x800, 0xffffffff, 0x2, 0x9b6, 0x29f214bb, 0x0, 0x3, 0x13, 0x0, 0x2, 0xfffffffd, 0x8001, 0x7, 0x6, 0x9, 0x9, 0x800, 0x6089, 0x9, 0x1, 0x7, 0x1000, 0x101, 0x9, 0x1ff, 0x10000, 0x0, 0x7, 0x7, 0xb07, 0x7, 0x3ff, 0x0, 0x6, 0xfffffffe, 0x80000000, 0x1e, 0x1000, 0x400, 0x400, 0x2, 0x80, 0x2, 0x1, 0x7, 0x3, 0x10000, 0x6, 0x1000, 0x100000, 0x4, 0x2, 0x7, 0x1000, 0x4, 0x4, 0x7, 0x8, 0x7, 0x10000, 0x3, 0x9, 0x6fbe, 0x1, 0x6, 0x2, 0xde, 0x9, 0x3ff, 0xfffffff9, 0xfffffffe, 0x81, 0x1, 0x83, 0x7, 0x7, 0x6, 0x9b, 0x8, 0x7fff, 0x6, 0x5, 0x8, 0x1, 0x9, 0x4, 0x7fffffff, 0x5, 0x0, 0x3, 0xfff, 0x5923, 0x8, 0x6, 0x3, 0x9, 0x3, 0x0, 0x0, 0x8b30, 0x2, 0x800, 0x100000, 0xffffffff, 0xfffff001, 0xa4c4, 0x4, 0x3, 0x5, 0xb03, 0x8, 0x9, 0x2, 0x6, 0x6, 0x100, 0x6, 0x3, 0xfffffe00, 0xaf2, 0x1313, 0x6, 0x401, 0x1, 0x7, 0x0, 0x200, 0x1, 0x7, 0x0, 0x1, 0x80000000, 0x6, 0x52, 0x1ff, 0xffff, 0x5, 0x10001, 0x40, 0xcf61, 0x10000, 0xde5, 0x18d1, 0x69, 0xf04, 0xf6700000, 0x3f, 0x4, 0xfffffff8, 0x2, 0x6, 0x5, 0x3, 0x7, 0x21f, 0x0, 0x59b4, 0x417, 0x81, 0x4, 0x7ff, 0x8000, 0x0, 0x4c, 0x1, 0x400, 0x6, 0x4, 0x1f, 0x7fffffff, 0x2, 0xfffffffd, 0xa6, 0x8, 0x7fff, 0x8, 0x8, 0x6a, 0x7, 0x4, 0x1f, 0xfffffc00, 0x5, 0xffffffff, 0x375, 0xfffffe00, 0x5, 0x40, 0x8, 0x800, 0x4, 0x7fffffff, 0x9, 0x101, 0x7, 0xff, 0x4, 0x1, 0x1ff, 0x556, 0x80, 0x2, 0x80000001, 0x7, 0x5d3, 0x2, 0x5, 0x9, 0x7f, 0x8000, 0x1, 0x9aa, 0x81, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x101000, 0x9, 0x10001, 0x7, 0x2a0, 0x20, 0x1, 0x1, 0xed, 0x3ff, 0x1, 0x7377, 0x24ce, 0x4, 0x8000, 0x40, 0x80000001, 0x200, 0x3f, 0x7fffffff, 0xbb, 0x9a, 0x2, 0x0, 0x1ff, 0x7, 0x3ff, 0x3, 0x7, 0x6, 0x38, 0x1, 0x7, 0x1, 0x1, 0x80000001, 0x4e, 0x685, 0x40, 0x6d, 0x8, 0x2, 0xfffffc01, 0x7, 0x5, 0xffffffff, 0x1, 0x9, 0x9, 0x5, 0x2, 0x800, 0xffffff16, 0xf63, 0x6d1, 0x5, 0x7f, 0x6, 0x10001, 0x9, 0x7, 0x8, 0x10000, 0x491a, 0xd1, 0x2, 0x3, 0x6, 0x0, 0xc6b, 0x1d5b, 0x0, 0x3, 0xe705, 0x3c19, 0x400, 0x5, 0x5, 0x10001, 0x5, 0x8, 0xfffffffd, 0x8, 0x0, 0x6, 0x6, 0xc2, 0x9, 0x3, 0xfa, 0x1f, 0x1, 0x5, 0x401, 0xffffffff, 0x4, 0x8, 0x2, 0x7, 0x80000000, 0x1, 0xb5d, 0x5, 0x0, 0x7, 0x7, 0x4, 0x401, 0x4, 0xffffffff, 0xffffff01, 0x0, 0x1, 0xeb7, 0x1, 0x5, 0xffffffff, 0xfff, 0x9, 0xa25e, 0x4, 0x800, 0xad, 0x342f, 0x4, 0x256, 0xf9e, 0x10, 0xf9, 0x2, 0x2, 0x40, 0x1a7, 0x5, 0x10000, 0x7, 0x32, 0x2, 0x2, 0x20, 0x82aa99c9, 0x7, 0x20000000, 0x920, 0x1, 0x7f, 0x6, 0x10000000, 0x200, 0x6, 0x6, 0x6, 0x2, 0x4, 0xa305, 0x0, 0x4, 0xffff8001, 0x4, 0x5, 0x1, 0x0, 0x1, 0x5, 0x1, 0x20000000, 0x7fffffff, 0x3, 0x3, 0xd82, 0x8, 0xf4, 0x7fffffff, 0x4, 0xb091, 0x3, 0xd9e, 0x82, 0x7, 0x0, 0x10001, 0x9, 0x1, 0x80, 0x1, 0x8, 0x5, 0xff, 0x5, 0xba7f, 0x19cd, 0x731, 0x0, 0x10000, 0x2, 0x7, 0x5cb7, 0x0, 0x0, 0x7, 0x2fd, 0x5, 0x2, 0x4b, 0x4, 0x0, 0xffffffff, 0x3f, 0x9809, 0xa3, 0x9, 0x86, 0x1f, 0x1f, 0x6329, 0x6130, 0x9, 0x3ff, 0x4, 0x0, 0x15b, 0x5, 0x3ff, 0xb4, 0x7fff, 0xffff, 0x8, 0x2, 0x1f, 0x1, 0x1000, 0x1f, 0x80, 0x8000, 0x8, 0x62b1, 0xb3, 0xe556, 0x7f, 0x4, 0x5, 0x8, 0x1, 0x5, 0x6, 0xc59d, 0xff, 0xc57, 0x5, 0x5e, 0xd7a, 0xfffffffd, 0x8001, 0x7, 0x0, 0xc325f010, 0x1, 0x0, 0xa, 0x6, 0x0, 0x8000, 0x6, 0x200, 0xfffff954, 0x81, 0xa0, 0x0, 0x8, 0x3ff, 0x5, 0x80, 0xfffffff9, 0xc3c, 0x0, 0x2, 0x3, 0x3, 0x6, 0x4, 0x1f, 0xfffffffc, 0x1, 0xfffffff7, 0x2, 0x13, 0x0, 0x3, 0x0, 0x10001, 0x5, 0x8001, 0xa1, 0x4, 0x80, 0x0, 0xcb3e, 0x9, 0x101, 0x6, 0x9d, 0x5, 0x4, 0x2d4be110, 0x20, 0x7467ec96, 0x4, 0x4, 0x4, 0x7, 0x6, 0x56, 0x6, 0x45, 0xd51d, 0x6f12, 0x1, 0x9, 0xce, 0x6, 0x5ea, 0x8000006]}) r6 = dup2(r3, r3) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r4, 0xc0505510, &(0x7f0000001300)={0xfffffff9, 0x6, 0x3, 0x7, &(0x7f0000001180)=[{}, {}, {}, {}, {}, {}]}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mmap$snddsp_status(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800002, 0x10, r6, 0x82000000) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000000)={r7}, 0xc) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000001440)={r7, @in6={{0xa, 0x4e21, 0x4, @remote}}}, 0x84) [ 311.860910][T14616] 8021q: adding VLAN 0 to HW filter on device bond60 13:08:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:17 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) pidfd_open(r2, 0x0) r3 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:17 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x9, 0x3, 0x260, 0xf0, 0xffffffff, 0xffffffff, 0xf0, 0xffffffff, 0x1c8, 0xffffffff, 0xffffffff, 0x1c8, 0xffffffff, 0x3, &(0x7f0000000100), {[{{@uncond, 0x0, 0xc0, 0xf0, 0x0, {}, [@common=@inet=@set1={{0x28, 'set\x00'}, {{0x0, 0x4, 0x3}}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x2}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x1, 0x5, 0x4}, {0x2, 0x3, 0x1}, 0x8, 0x1000}}}, {{@ip={@local, @private=0xa010101, 0xff, 0xff, 'macvlan1\x00', 'macvlan1\x00', {0x12dcf7898a2b51a7}, {0xff}, 0x2, 0x1, 0x5}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0x9, 0x4, 0x7, 'syz0\x00', 'syz0\x00', {0x8}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) r3 = dup2(r2, r2) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mISDNtimer\x00', 0x50203, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$unix(r3, &(0x7f0000000040)=@file={0x0, './bus\x00'}, 0x6e) r4 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:17 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000080)="ebabdf01456bf0f29159fdb75cecec3622cdc975413f61697ed7d0673b83c868c430ad6ce4252c98da35ddbef2bd5c26493388a10442c02b7ca0540c2d2a72fe528d19fe28dc6858d8b06f94caae75f67d26e52e7976ee454eb02a6bee3584c1") sched_rr_get_interval(r0, &(0x7f0000000000)) 13:08:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 312.357176][T14688] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:17 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x200a00}]) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) sendmmsg$sock(r8, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r10 = dup(r9) sendmmsg$sock(r10, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$F2FS_IOC_MOVE_RANGE(r8, 0xc020f509, &(0x7f0000000140)={r10, 0x4, 0x80000001, 0x5}) io_cancel(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x582c, r6, &(0x7f0000000040)="7517777d5ff04326add8e1414659415138ffda019e3a3c72f4785640cae935f70bc34af5872a79caf4edbd33234bcbd49c911630a460bc0b243c9bdcaca66ad52b00505a5b04bf96c6de98c380a268a95cad865c34098d0f44485fc29a47f80fc8115582e913a5eaea6b0f8451c8dc5e50b21e6a7e7436b921c626dcebc3d3be3131f34adbb2b4f9313ed187a000da5f0f283c27af2040380c6efc73b819ed30141e9c411699cacb44d06bc7c9c27878f0faea3c3b56f0412a4129d3ec30841eca1a22293aab4a72e6e35b9151264ad96e585d6328048c473547d6274c15c2b249959c0902", 0xe5, 0x0, 0x0, 0x2, r11}, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:17 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) socket$netlink(0x10, 0x3, 0x1d) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$KVM_SET_CLOCK(r4, 0x4030ae7b, &(0x7f0000000080)={0x2839, 0x80000001}) r5 = dup2(r1, r2) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x5}, 0x1) [ 312.538816][T14688] 8021q: adding VLAN 0 to HW filter on device bond61 [ 312.546842][ T29] audit: type=1804 audit(1595941697.600:244): pid=14735 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir823353437/syzkaller.wzoXyC/162/bus" dev="sda1" ino=16383 res=1 13:08:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 312.933351][ T29] audit: type=1804 audit(1595941697.990:245): pid=14735 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir823353437/syzkaller.wzoXyC/162/bus" dev="sda1" ino=16383 res=1 13:08:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:18 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={{r2, r3/1000+10000}, {r4, r5/1000+60000}}) 13:08:18 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) getsockopt$inet6_tcp_int(r4, 0x6, 0x6, &(0x7f0000000040), &(0x7f0000000080)=0x4) 13:08:18 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) [ 313.104451][T14756] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 313.168106][T14756] 8021q: adding VLAN 0 to HW filter on device bond62 13:08:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:18 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000000)={0xff, 0x7}, 0x2) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) getsockopt$bt_sco_SCO_CONNINFO(r3, 0x11, 0x2, &(0x7f0000000680)=""/4096, &(0x7f0000000080)=0x1000) ioctl$SIOCNRDECOBS(r1, 0x89e2) 13:08:18 executing program 0: mmap$snddsp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x30, 0xffffffffffffffff, 0x3000) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) kcmp(r0, r1, 0x1, r3, r4) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) 13:08:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:18 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) sendmmsg$sock(r2, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:18 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) r4 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$USBDEVFS_REAPURBNDELAY(r6, 0x4008550d, &(0x7f0000000040)) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) [ 313.743810][T14827] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:18 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = syz_open_dev$ptys(0xc, 0x3, 0x1) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r8) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000080)={0x4b, 0x0, 0x6, 0x0, 0x0, [{{r2}, 0x3f}, {{r3}, 0x2}, {{r4}, 0xd1b8}, {{r5}, 0xa438}, {{r7}, 0x3}, {{r8}, 0x3}]}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) recvfrom$netrom(r10, &(0x7f0000000180)=""/170, 0xaa, 0x2, &(0x7f0000000240)={{0x3, @bcast}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}, 0x48) 13:08:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:19 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x10, 0x0) [ 313.963975][T14843] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 314.097007][T14849] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:19 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x15a960ce69adab3a, &(0x7f0000000040)="808b57d5ae5c57f34f885a047f796cd62aa245d5ea1b8db2d3f5d6d7c14d9b31561d2e5338a76bf40a670f", 0x2b) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup3(r3, r2, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000000), 0x200a00}]) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) io_cancel(r4, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x6, 0xb59, r6, &(0x7f0000000080)="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", 0x1000, 0x7, 0x0, 0x1, r8}, &(0x7f00000010c0)) dup2(r1, r1) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:19 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x184) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) sendmmsg$sock(r3, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) getsockopt$IP_SET_OP_GET_BYNAME(r2, 0x1, 0x53, &(0x7f0000000000)={0x6, 0x7, 'syz1\x00'}, &(0x7f00000001c0)=0x28) getdents(r0, &(0x7f0000000080)=""/244, 0xf4) [ 314.289548][T14858] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 314.312396][ T29] audit: type=1804 audit(1595941699.360:246): pid=14859 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir823353437/syzkaller.wzoXyC/166/bus" dev="sda1" ino=16018 res=1 [ 314.317933][T14858] bond63 (uninitialized): Released all slaves 13:08:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:19 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r1) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={{r1}, 0x7fffffff, 0x1ff, 0x401}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x8000, 0x1) [ 314.497498][ T29] audit: type=1804 audit(1595941699.480:247): pid=14865 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir823353437/syzkaller.wzoXyC/166/bus" dev="sda1" ino=16018 res=1 13:08:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:19 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r7, 0x40044103, &(0x7f0000000080)=0x9) r8 = dup(r5) sendmmsg$sock(r8, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup=r4, r8, 0x15}, 0x10) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) [ 314.578386][T14872] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 314.627009][T14872] bond63 (uninitialized): Released all slaves 13:08:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:19 executing program 0: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x20402) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="6ffe000000000000000003000000400001800d0001007566703a08"], 0x54}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xfffffffffffffd04, r1, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x88, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "3d85bbacadbb6a36b94a11c6a7f65a16745ea9f8fd48e37e831a56e803c5"}}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "bdce63c25235a317c5aa84b9d51dd269637bbfa5"}}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4}, 0x4080) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) [ 314.827954][T14889] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 314.874590][T14889] bond63 (uninitialized): Released all slaves [ 314.896339][T14893] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 314.917154][T14893] tipc: Enabling of bearer rejected, media not registered 13:08:20 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b8431"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:20 executing program 2: open(&(0x7f0000000000)='.\x00', 0x121042, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RREADDIR(r1, &(0x7f0000000040)=ANY=[], 0x2) 13:08:20 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xee, &(0x7f0000000140), &(0x7f00000000c0)=0x4) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0000121055e545f7d3b76cee8035154fbcb78d3c86e22794e00c86eac5875be1c7c73dea47299bb21c2e0b96d0ac085ad338b16ecb2d14d1fa91ea74e1b85bf7ecf42f1efc854603305a28e67ce5d5b70f5e3e2d0fcd99cf4dedaec0e5f772e709", @ANYRESOCT], 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) sendmmsg$sock(r7, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r7, 0xc01064c7, &(0x7f0000000140)={0x5, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r5, 0xc00464c9, &(0x7f00000001c0)={r8}) dup3(r1, 0xffffffffffffffff, 0x0) finit_module(r1, 0x0, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x400400, 0x21) io_uring_register$IORING_UNREGISTER_FILES(r9, 0x3, 0x0, 0x0) 13:08:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:20 executing program 0: mknod$loop(&(0x7f0000000000)='./file1\x00', 0x0, 0x1) 13:08:20 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "c5479843b32c6d19", "a51485aae83ff05307294e1b9d8e1746", "5f5ca1a4", "3dbe5d698972d34b"}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, r3}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) 13:08:20 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) read$proc_mixer(r3, &(0x7f0000000100)=""/108, 0x6c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) setxattr$trusted_overlay_redirect(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYBLOB="703b67cb6ec31d7bb37dcdb7457a9bd63219cb7bbaf5"], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 315.415819][ T29] audit: type=1804 audit(1595941700.470:248): pid=14932 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/187/bus" dev="sda1" ino=15754 res=1 13:08:21 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b8431"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:21 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={&(0x7f0000000040)="03aef56c756ce04c2ce600a00fd144b4e9aa23ff2f1bc31443bc6c74687e5db29372aafbb9118ef0638cc4c7794946e6845a34f7841ff3dc0bc8a50fd778daeccd17d5da1a727f0555397bac3a58eb81b1e208cff5326233739518a562f3a3f7c51bace815597ab05034869a6cf41088a756b9a2d99a9200d5905df708d66c2bd14b695678af2f458dc620af198c52f26a1c5330a0eb831df4e23c7f959b00963fe5bd0bb4421b18656a", &(0x7f0000000100)=""/13, &(0x7f0000000140)="2ac433cd1e4efe0d7c787c8d2540e04a4b5a0c093fb30d6bfe1e495eb186268dde52825c1f4f14dc8493d84628715a309692aeb96500f7", &(0x7f0000000180)="14f0bcb46ded58a55a2c0582cbbc9cd10b047fe27edc035b58e68dd8b5eeab5d8aba168298a00c5e4e15e07d42595f589237df7023edd2f14585b34ce3408736466764a5168660cd953d612e2a3b8bec80e6344222cc5f4acbb14cae17fb48012edfb706162e6a10b5be8511982403b59719058400db19f5e5917b95191e6dbb2a0aa39c2c3cfdd0e678562a6f3df65fd2ee0748a929e70c8378c75af96d7b58d5338651c8b767a60063411ad0dba3eab84ea54cab32210ce47c1364ac8d989c17d7b8b7ac0d25cbb93e3e976073dc0de6238a3ffa05501da1f1d7dadd7f7a418f79d086997928cba44c35a14adf92c462df", 0x80000001, r3}, 0x38) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r6 = dup2(r1, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) sendmmsg$sock(r8, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) setsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000300)=0x3, 0x4) 13:08:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:21 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = socket$inet_smc(0x2b, 0x1, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000140)={0x3, 0x3ff, 0x20, 0x6}, 0x8) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000180)='westwood\x00', 0x9) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='scalable\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x9, @loopback, 0x4}}}, 0x84) 13:08:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:21 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x14, r5, 0x1, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0xa00000000000000}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000020}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r5, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xc2fe}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xe, 0x3b}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x33cb}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2040}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x80) r6 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$UI_SET_SNDBIT(r6, 0x4004556a, 0x4) 13:08:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 316.195473][ T29] audit: type=1804 audit(1595941701.250:249): pid=14935 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/187/bus" dev="sda1" ino=15754 res=1 13:08:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:21 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) socket$nl_audit(0x10, 0x3, 0x9) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r6 = open(&(0x7f0000000200)='./bus\x00', 0x210000, 0x1) dup2(r5, r6) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04b0", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:21 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000000c0)={'broute\x00'}, &(0x7f0000000140)=0x78) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x101400, 0x0) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f00000001c0)={0x8, 0x8}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x2200, 0x141) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sysinfo(&(0x7f0000000040)=""/109) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RREADDIR(r3, &(0x7f0000000100)=ANY=[], 0x2) 13:08:21 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) sendmmsg$sock(r2, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000480)={r3}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_MAP(r7, 0xc0286404, &(0x7f00000004c0)={&(0x7f0000ffc000/0x4000)=nil, 0x91, 0x5, 0x44, &(0x7f0000ffb000/0x3000)=nil, 0x3324}) r8 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) sendmsg$unix(r5, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r9}}}], 0x20}, 0x0) r10 = getegid() openat$dsp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dsp\x00', 0x200, 0x0) syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x2, &(0x7f0000000240)=[{&(0x7f00000000c0)="b3ef9401fbdb1416aa0fa405be056cb938d9ccccef8e2f7759fb5c5edc2a501dbeba1283dd60881b3337eddeab8da87e21d72081397304ae96bd6c87de08009be542dc23dab372f289103f89c785d1d0009949ed79db78b2be05d68e9e171fb95ded39524a621e445cc6127fd86b548631be77de", 0x74, 0xffffffffffffffff}, {&(0x7f0000000140)="2467e4061d56cce2165504c584403b8109b2b9709db17f37515f9b74cbc8ca3373a208fce18fe247aa47a928d1853621ed4283e78a1e53cf9690ea35cdb81edc80f7a65670b8ee2198ca20828910f662e0f2cc7ea64e30f5ad16ae3a13c651bdf6bc1c05117e415d48bcc86486b7f415be93d601825020907864d2767ef994a4e559dabf35e0127766334fd9bd382240bde542cecd2f1a41f17d3c2d7658b5e890376ac145562ececb0f99ea3ec915b071e80b55101b6e510897904e5ae406795633be", 0xc3, 0x800000008bfc}], 0x400000, &(0x7f0000000280)={[{@dmask={'dmask', 0x3d, 0x2d}}, {@namecase='namecase=1'}, {@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@errors_continue='errors=continue'}, {@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@gid={'gid', 0x3d, r9}}, {@fmask={'fmask'}}, {@umask={'umask', 0x3d, 0x5}}, {@gid={'gid', 0x3d, r10}}], [{@obj_role={'obj_role', 0x3d, '/'}}, {@smackfsroot={'smackfsroot', 0x3d, '-\'-'}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_lt={'uid<'}}, {@dont_measure='dont_measure'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) [ 316.427159][ T29] audit: type=1804 audit(1595941701.480:250): pid=14981 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/188/bus" dev="sda1" ino=16383 res=1 [ 316.496530][ T29] audit: type=1804 audit(1595941701.500:251): pid=14981 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/188/bus" dev="sda1" ino=16383 res=1 [ 316.527964][T14985] exfat: Deprecated parameter 'namecase' [ 316.533997][T14985] exfat: Unknown parameter 'obj_role' [ 316.581782][T14992] exfat: Deprecated parameter 'namecase' [ 316.592277][T14992] exfat: Unknown parameter 'obj_role' 13:08:21 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b8431"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:21 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$SNDRV_TIMER_IOCTL_INFO(r4, 0x80e85411, &(0x7f0000000040)=""/180) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:21 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f0000000000), 0x1) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x1, 0x19) ioctl$RTC_AIE_OFF(r4, 0x7002) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$CAPI_CLR_FLAGS(0xffffffffffffffff, 0x80044325, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="6ffe000000000000000003000000400001800d0001007566703a08"], 0x54}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r6, &(0x7f0000000780)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000007c0)=ANY=[@ANYBLOB="796e9dd97b1cc8cb560e55dd205a93982ed7e2767dae36900e74d11e06f1c9", @ANYRES16=r7, @ANYBLOB="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"], 0x5ac}, 0x1, 0x0, 0x0, 0x804}, 0x804) dup3(r1, r0, 0x0) dup(0xffffffffffffffff) finit_module(r1, 0x0, 0x0) 13:08:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:21 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect(r2, &(0x7f0000001500)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null]}, 0x80) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r6) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000001440)={0x4, {{0xa, 0x4e24, 0x66, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xa4}}}, 0x88) setuid(r5) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x3ff, 0x5, &(0x7f0000001300)=[{&(0x7f00000000c0)="b960cd8eedcf8bb6f559b7f5892bcb6755b95acbec8ecffe62e7711f96d50808b6f67dc5e5bde522a7f394be47c941e66d2157", 0x33, 0x1}, {&(0x7f0000000100)="594c17d28f6888b0f8e0b0d1702a52b5cd3f4b9b84b39aaa1713eafb26b8f6227eed347d7b73454fd657becef017cbb982ce623fc292de64da649fff22679886b590db088c53c046edcad92e59a8eb6668e72f9a24e6e246cf5d388c8f64f3bdf5a3aae612ee2d1824093af2a4061c514872f78fae3d1c30c8148eaf139818f9baa40b7549a2e9e19d6499cf0ed096fa7806694e9bb4fb9d676fd4dab7f44d9c3801fe0e089862445047e3b64a45c18c5ae625993b73918810e59d50094248afd09b60989a55ee12b97d702de9f0f9f00ca5304990b8eba20e59be95ab6e154942467f8243366065261f9a89931a0e9ebfa871b36d", 0xf5, 0x3f}, {&(0x7f0000000200)="8cc577c766d6e3ba1701658eb977acc14d90b64d80a2271240f94aaeb4e7ea4602f63726e99e45b7e6f93cf9cc51ebe89bb799e0099b3056a1d69d860eab9368af6a5a968699a1b744f3349b4f2d40080416e3d8a79c582754c79d9f85710b0778002461e97605183710332c589f76320c7cb4f214fee9bce7", 0x79, 0xbbc4}, {&(0x7f0000000280)="bb0b7e7465bac6a54532761f4b40f4d73a0079b4d8cdb35af49e3deaf8ec31b84a0cdb4289dd650fdc5249952304eaf608dc76154d862467fd4e34e64e3cb39edac0c1af60f77a17efa05846751ae12098e217aa7c990fb2c1dc7bfeefa8d92dafd1357fc025d2e83a5d69f4632c279e9903825242eeeee8fb", 0x79, 0x2}, {&(0x7f0000000300)="7c29cefe1c2033a0798fc9cc90b2c48cf96812211a19c12792cea330014e32be1ef6d6e1730e87377e3f9edf9fb9ecc051b5069b7040c428879c504ed00dd730b611a3e64d1f9c8243f3cd3a5c4429a25fc87f0fd99bd4308011f759fe5d62fbaa3605e0d84ca74d70f69c5dbd453f6ffc6d299fc24e231d277f586c558b69e8708f722e0cbea86f454309b0580aadfeb87d9d5dd93f1f65a567990fa500d1cfdfc6533afac5988d884d46295160d361536ff3bd89583b9d9c6cb63c5218a895dd1acba42d718f5f5aa254503796aeab2d89fedde0290c08c60239704030beec96e285008c19fea882d0ac12f868ae437c4a85301c2794a6c3f151b7919c2e25ada19ce5969336d19f45b46cd89cccef22b89c5f872d06d0f082d2117c604d252494be0033d39731547cbf9d210ef46208aeaec283826745cd2aaeb329e1006b4395eb670097605eb11ab65fec90b648e323883e6ec9022ba7126d5a00d40c8f78428297103f298da72dd244eab4aae39dd24945da23fb5c345a3c9e54f46c290e42241098fe48f06f1368f424ee6b7384a0e61305aa44b71bd8acb81ab3a033985a35e1500dda6f93e6709e2588d9786b37eea70197641dfe9355be2975c1bcd758872acebc84943d129ec3b9060bbc93c6d7b2f5dee8e2513f41db2fd3106ab6acfe6398a6ce513b3c2284b13507f9ec0f965dce4074f346c0baa5ff2921f94f588d0f0e813771f80c8674bb7c92360223b7e96bbbfa3420d32b02a98c3aa7b0e367fc570144f67149c9472b5d81e6073c3f3a9a4286580dd07aaf45fa3ba3333d2d6fe7566aa2a3371e11e05080996fc5e82e56ef805bce5c66f844b6193271b122a45fa1697bba70dffd0dc56105f88a639db0d266bc5c4b5ed4931c73c8d974b3bc53625a799bd23adb5841b4bedf14dd95505d26d08cc0613801fc1e218528863433a12c88abe81308fc435500fb18690f7d253d5b808a3f6ffb888384af7018c7f3a9e4d5149bf1120469e4be2a01f84979f2daac13957ff34e23ef7b4c05f4e4709e4d2d265aef9ae6ddd2c8e85309d7a2b80b74b8d44bc7858304e6bf3f4a902366cdfd418de90c06d28a756843161668491ed3deaf49d98d64116f51cdc8e55bfa1a55d67523639957376831aec14726630a0af9aab90a77ea4a17c88d3dcb5499eb0928bae27317f43eb8eeb96e49977cfc2d93f4eeb0ae0e762d3b0baa7ec18cc11fa082c93f9411a53bea0e11a9d165725afe8d815b5d5bea869ab68b97704704ba381be87fe2877f7b778836373ebba828a4498663bd58acf754cb7cde2db0bcd8eb421f4ec8b74402450d66f5fd35ccd39b184313dd08d2cd427eaf7a4ea7b3e58952cf2923a66c2156f8b5f2eaee051930503a46067093f3014e119148c1e249bf7b89a4e2b996731c3219fa8eb5556806d2130a4e86116a231e355ae47d279e5a297371505ffb701daee74b278784cc90964b1381c78f61ceef6de4d2ecde5ce57c7203df9820a5352880bdc344dd6b9418515336a9c2ed142f1159eef4b445471b2e6b407fe336275fea0b0bc98c31c9e35fe19c39ed8e107bc97ccbceeef43a1969aa2c40457851f2f51639bcc0e1f3cc8572cccfb8561f520b68aa165ce3a3c8d4adb9de41f1c2d9f125d9f79f128ab2cb2d7a1e2bb3b8a4f71d8da95d4b5fc25b67b33df11cbd3cf9d2cead0b8a35523a6304e2e9b6b467b2c59767b087447a1550d83e0eca58a61b604cb5631030e7266246966f46950ab409544568a1ec6a2b9287bb2e7207dfe461ee6f916e0921b48ba001db1b9ba3664c9bba3d015119db104da3860d828c2db37f22d8a72999986ffad4e3aae13576daf50c5d986782a94f7c6686b962c639e7d6ac99f1f16470c026cf136caa2a0cf15c107204c584b237300872aa411e06b412fa696d1a92e2b4ee4565a37671ef0d72d9c6cdbfb3ef65b427ae56d1269231c6eaa1cca384f3f60e3eb0964619d7511154119657172f1fca0337e904e09a31cbb420558e5dd34c9803f50a7fffa446bec500c8cc6d25e221b8d6196d27ed8e9a8ad7f03f4e730975296b2c2768babb5e8fcdac0dfe91cf74aa1dd4c4c510842b09c1af14c5d672abc2c4a881e33e8ca751709b2c196709e9c511e6cecb42f3c4fd6d0ceb72cde9eb34b2823d84bd1112ab487cb0286f7d42e403202902986482678ed819952cb8182071c98b31077c5a330862faf8c2bc1566f53aa3962860c9fb268de9a1c8b0c010598707735781a8b9f6586d7b08537abc422f9fc4249aa6b17978d7d88e00bd417396c87678eb313999c3968d043313eab583525dbd1795f7a556640ac7712d43887d453f0b651ea54686491687d38e2ee3e5bec6d79b95efbfa6afa86a65c98cf04c18163a89257ff96770bdc813cc7c3a1c69690bb00f4bf7caab2c4fc21c0f46e79536a3b95c887e110aa8f89f4abba2bc1f1d7ef4771f71c07893715e9f2d003c27cf2dbb9a87ed6577e9738f51edb48682730818844763fb4ef746e1271579ca8bc6e9d09c2148cdcf46da8127dc5070be37568bbe1d357dceeb8c745f2c9bb788dbc72fcc32eed2532ee505f627eac970a7915432be433949215a085285ac8b4557a07da6329c12f715334f6bee826166ebd546f13a27007a2207a95456d8ded30510bf55e4b2ca92b2e8dca4444ef523f62af80e0ae1c25c2efcfe07f79596b9c838b224f3900cd90d5a43d8b4fdeb437f26e212b79638ebbad7ada2a29b8e0fcbb733ac07f3852b61df9b6e3c37326a1fca4c838fec14fa5371b758311fb08e59777e8ad518b67e9a9203e9cb65170d27686aa3fe542296fd9f07defa51e8d6f76e8f4989b6c8d7a7b23b61d616051dc200f96fbbdd7bc24a360b9347f8338627b9c7dd850f306873da6899fd2ee6f17955835a7312881b425050ab920978d879f2b51b8bca427c60bb011f7d015f7d985ff3398ee2039829a191c7bad06cacae3439a5a2597052b02a44ce646c7a57884a647a133f8785c5fe1f841e71c0e524fde7f139b7d828e99f498e587601e06b6a9227e3bccc5fbe6b01fc150eda272a73842c166cdcba1fea1264fd31382de12902ad4a8079aea1bd1a53313c055f9b01cf9b081004b4f40d516ae5d23a5234665ee5257fca5eb9629ddde2d200a8e20afb861c5283a1fe8685a10db4720e4b700d762f2c7cc0450bc0477248ab56198c860fe9859d381ed02e35c1e010afae92037e09306570420d7cc852222f1b584b267969224d388b5d0287cd64619d92d7c912d450ba5db836f678dfe4c41d9532b10cd9851d3013e29b0b4d4f2895576e6ad48d4b42d6eebe5a2e20ba282fab54fa7b26f359ed0bb9f37f7c4152dfb5c6b881099da76799925159482ff7404059e686c2e00fce5f4625fbd48e30f73cb0bb0527b786c4b55efe75290ffedda89a36c516b610fb45c46129e7df7e82b97ea5426f4fb5fd15283d981089778fcd5fcf354a5c788fe1f12909d693a2f135e2f20ac2088a26bb9d62a742c3a54063f3bb4298f0127d479506e22cd7f5f6d3db180667deafb19dfc8e7c36a46d3b47fd9400063c06891b89e374445e8c2b7dfb9e3ea622705710cb73d0d14ff0db67e13e0b728e5bc750de7cb8ff848d4fe5a4ceb5667d1ca1aa42b533a77ef2ba1410629f2a8ace55f0bc1fc1def7f2ec8500d6b060fc1b1bd01ac0955c36261f03e7b7f48b5623ea892920314525d7ea2fa4c4b558a2b5a323164d3a77afc879997ca33e9039061b41012b4f882e217195c4b45a994afc521faff1b8054c67a9eaf1cc47cf6a33e67fb67e7c77898d973d9bd4c4a7194e399dd78b1cf9538c2db6f323479ce0a2662759f7a2048be0ffda32d9e375d2e13e8d0175477a9679c7ee1cd32cc19b3174c6042cba1e44a310abf61b9fff6450d0e849921cf007ff206a57072f724399ce9caf618cad6ed24f644aabdf8180eaa74736dd15b04abd272c4c96a74eabd66565613658a20ba22442c5c7648b3ced1529edbb5e8bff2d7059e12aeb07e91f1b282fe3c3e8198d3d2b218691cba74b1361b104920a894e0b790b10c035fe3539ecfe5082766ce5d4b20765c025f0c766f705f2725475412f36561d2dd8a6db4001259d1a9ed94d5a51628f778e4b97be51377a0b344d4cb6a347d08ddfb67b0f34baba3f072ee2bf1854c65993124021a5dae49e36a0b838eb3717fbb8010659f39056085e4c3341f36f742ce444473bf879b33fd2fccc2158c1b99cc484a04084b3fc4ad6aa8db577a922fbe3475fe6d3c57a55ca1d214babe1bb315610609594497279fb6e89b89e0f9a777e2841aef7da48711525fe9faf347ff53bf90fcc99703fb3a9533bf2091f5758afd9d29103c709781b484c0518fd085f549dba34ab30d0e83681f6004b72e792c9b79bbc18b6ab1a685654d43ac0218dced131669d452648f096b5cb061749b7e2a65645055fce22d266484db6f012d84f80b8174474bef1f7e1c426d4040b83abf5478682b75944999094616bb301ba025ca1877a71f958022639d1b779f8308afad14c2af55017752d4de6a6cf4951b0b6fcc94bc50b2ac40d8be7dcafed6f9d6da42a7040caceb727c6ccbe97ad0566eb5f883c24c93c6ef36e62e50c1b52e7c0d6c0f0766b02963e5477a744f0f265162ede9c5141f1de57b45ee77fa6634aa449fd6d20666ccd889c3facc2573757208f6908ee7c4cfdf625d9d28817f4c71d379ccd0fb8ba49231b290fdd4b18f3e14e98952f8128bdbf58f7fb339d08c4a46ea27e3d4cc0ef35a2605852a159d56385376c794359883aa6b91fe69fa20db879789c7a5bd793aebde1189cbf9862b80bbba73bb7712e748a8a127d559e153c96e10500d24af124511e08ffef136dca106fb5667a425e26cdc083f245cd614d7002397e0304e25032b2ddc7392d2fbf33be4a7b77c6835b0200ed0b906e42771cf4ce3d385f9f053dc13dfaddc51579aea64f0e5b69a70482172e4e0f3c50fda9b1c0b730fd89baa911aab59afa0863d00b7aaab5733079fd6ccc6e9e8304a638d4b981f07791968fa096fe7b5e6451fe3d8dc328c5b800c990af20ee3c7b9e5b87e2bc2e4e49c9177d9a8b25db79685dbc50ca598f64d7d893d331d82e6053c7225d10844b45de0b04d9b764f318253a03ecf0b6482f78ee4070f2ca208217117d12b4eb587f87da55ed9edbdb9c1c8413e9dc2d042bcea1c7016ff56f7234490f83b1b4d3b97a7aa2881bdda93bcf714112d5e809cbe8259c90f091b9ca088729266180e398b2fb0880a580139e92b40d475fc7f49a971c38ca277e1cd48605391d199d492ccca8b8f100e4dfeffa8f61688d2f2f40632c11c5497e89ba5cff315da953f5f93b66edcb2f081298f2852323ba0f3223c38c608ba2e625f5daaffa01cbc12aa17e5fa33c16bf4e3a006f849ac4abb4851c7e6b4f836e18cc097b6e7d5892e0ec7fcd88275d255527db2798acabf89c41b72bfc8ab6dd0c9b50284e32bbccf0ceb94f80d7c4233e458f3264739e0163a2fa3df3847f1baf986222a723525d84d1cbb89a02c729214111801a6b8e01e84fa460acde0493a3f8d4b95223a296762746f7b0a54c88e950c0ccdf3e04d97192127275d62624a24ea971ef7e5f96d73e6d497def3249671c503ff4a269bb091d3f6b1aee20488ecc180b5187a2365aa2587935d589c0e1d4e042ac74d58acbbeb757bb36469ef91c86dc94613bd7215491813410b55ceb54caccb497d8ebb11bc7fceae011fc6a5f09f4bea227bef1835676", 0x1000, 0x40}], 0x80, &(0x7f0000001380)={[{@mode={'mode', 0x3d, 0x54}}, {@norock='norock'}, {@nojoliet='nojoliet'}], [{@fsname={'fsname', 0x3d, '@!*]%,-'}}, {@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r3}}, {@uid_eq={'uid', 0x3d, r5}}, {@obj_type={'obj_type', 0x3d, ')(\\&}]-}'}}]}) [ 316.978079][ T29] audit: type=1804 audit(1595941702.030:252): pid=15005 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/189/bus" dev="sda1" ino=16371 res=1 [ 316.983058][T15005] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 317.046965][T15005] tipc: Enabling of bearer rejected, media not registered [ 317.057593][ T29] audit: type=1804 audit(1595941702.030:253): pid=15005 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/189/bus" dev="sda1" ino=16371 res=1 [ 317.062982][T15007] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:22 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x180c2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:22 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f00000001c0)={@local, @initdev, 0x0}, &(0x7f0000000200)=0xc) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x78, 0x0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r2}, @NL80211_ATTR_WDEV={0xc}, @NL80211_ATTR_MAC={0xa, 0x6, @remote}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @remote}]}, 0x78}, 0x1, 0x0, 0x0, 0x4c850}, 0x4004011) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="24fb", @ANYRESOCT], 0x2, 0x0) dup3(r6, r0, 0x0) finit_module(r6, 0x0, 0x0) 13:08:22 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) fsetxattr$security_smack_transmute(r2, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x3) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000100)) [ 317.288858][T15031] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 317.468128][T15047] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:22 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:22 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1c1000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20440, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000080)="00090b81c109e0208f2fd1f4731c0947", 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000100)={0x6, [0xfff9, 0x3ff, 0x2, 0x3ff, 0x6, 0x2]}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r6, @ANYRESOCT=0x0], 0x2) 13:08:22 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0xc1) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r4) dup3(r1, r4, 0x80000) finit_module(r1, 0x0, 0x0) 13:08:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x4001fe) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000000)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r8 = dup3(r7, r6, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000000)={r9}, 0xc) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={r9, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={0x0, 0xfffffffa, 0x3, 0x5, 0x9, 0x56e, 0x1000, 0x100, {r10, @in={{0x2, 0x4e24, @rand_addr=0x64010102}}, 0xfffffffb, 0xa18, 0x1000, 0x6, 0x5}}, &(0x7f00000001c0)=0xb0) 13:08:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:23 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) faccessat2(r0, &(0x7f0000000040)='./bus\x00', 0x10, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) [ 317.932385][T15062] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 317.942358][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 317.942368][ T29] audit: type=1804 audit(1595941702.990:258): pid=15064 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/191/bus" dev="sda1" ino=16383 res=1 [ 317.999449][ T29] audit: type=1804 audit(1595941703.050:259): pid=15064 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/191/bus" dev="sda1" ino=16383 res=1 13:08:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:23 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x20, 0x1) 13:08:23 executing program 1: creat(&(0x7f00000000c0)='./bus\x00', 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x1, 0x3, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000000)={0x80000000, 0x80000000, 0x4}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) creat(0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) [ 318.081815][T15079] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:23 executing program 2: r0 = open(&(0x7f0000000040)='./bus/../file0\x00', 0x40042, 0x11050133bcb43757) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:23 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r5}}}], 0x20}, 0x0) chown(&(0x7f0000000000)='./file0\x00', r1, r5) 13:08:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff010000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:23 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x1) [ 318.855958][T15117] __nla_validate_parse: 1 callbacks suppressed [ 318.855966][T15117] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:24 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) r4 = dup(r3) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) sendmmsg$sock(r6, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$EVIOCGABS0(r6, 0x80184540, &(0x7f0000000080)=""/39) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f0000000040)=0x1) write$P9_RREADDIR(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="5ae8ae635d8231bb791917746918c1cbab052d3bb2d8b62659296d2c22f8919f3a7943e66c4ff8f837b0c73ecd4c41447ede67f72c8d735fdee5375af6b8479407b240688987a02170ca22fc0071aeaccb218ae10204152df407fc7304c8588c4bce8dc821e9006b3d77d298fcaccaf8d177db82f8b0cf", @ANYRESDEC, @ANYBLOB="d086528f8101f009dd3bbf1e12407c9881cfff0ca3914012f45b4803e7a54263812aa85a8feb11ec6edf34484799a29d3154a191d0f1c04b231130c6ee41cdcf263fc79d96a40eeede9bcfe9f89fafeb6b7b5fbc591220e55f7d871ddbfddbc4992a0e2ba8608a7998f07dedda3a34aeaee6efefce1300d5e45ad1eb0619fb2024025ff7cfe2a55eede1b7bdfcbbbee4e681d2b458678debd557135b0907f793282aea119ef819"], 0x2) [ 318.892845][ T29] audit: type=1804 audit(1595941703.940:260): pid=15123 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/193/bus" dev="sda1" ino=16383 res=1 13:08:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff010000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 318.985114][ T29] audit: type=1804 audit(1595941704.030:261): pid=15118 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/193/bus" dev="sda1" ino=16383 res=1 13:08:24 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x26, 0x5, 0xffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup2(r4, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r6) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRES64=r6], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 319.132160][T15138] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:24 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) sendmmsg$sock(r2, &(0x7f00000000c0), 0x0, 0x8804) r7 = dup2(r6, r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$rose(r9, 0x104, 0x1, &(0x7f00000000c0), &(0x7f0000000080)=0x4) [ 319.184055][ T29] audit: type=1804 audit(1595941704.240:262): pid=15141 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/194/bus" dev="sda1" ino=16364 res=1 13:08:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 319.313663][ T29] audit: type=1804 audit(1595941704.270:263): pid=15141 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/194/bus" dev="sda1" ino=16364 res=1 13:08:24 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff010000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:24 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$sock_rose_SIOCRSCLRRT(r5, 0x89e4) finit_module(r1, 0x0, 0x0) 13:08:24 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fchmod(r6, 0x80) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) setsockopt$bt_BT_VOICE(r4, 0x112, 0xb, &(0x7f0000000040)=0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000000)={0x1, 0x0, {0x945d, 0x993, 0x3, 0x9}}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x8000000) syz_memcpy_off$IO_URING_METADATA_FLAGS(r2, 0x114, &(0x7f0000000380), 0x0, 0x4) r3 = syz_io_uring_complete(r2) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r5 = socket(0x100000000011, 0x2, 0x0) bind(r5, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r4, &(0x7f0000000900)={0x2c, 0x0, r6}, 0x10) sendmsg$can_bcm(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x1d, r6}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x6, 0x1, 0x48, {0x77359400}, {0x0, 0x2710}, {0x4}, 0x1, @can={{0x3, 0x0, 0x0, 0x1}, 0x7, 0x1, 0x0, 0x0, "00497968c0c8f465"}}, 0x48}, 0x1, 0x0, 0x0, 0x200008a0}, 0x4000) [ 319.754170][ T29] audit: type=1804 audit(1595941704.810:264): pid=15166 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/195/bus" dev="sda1" ino=16383 res=1 [ 319.773329][T15167] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff01000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 319.823570][ T29] audit: type=1804 audit(1595941704.870:265): pid=15166 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/195/bus" dev="sda1" ino=16383 res=1 13:08:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:25 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x49) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:25 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000100)) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="044b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 319.917367][T15183] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff01000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:25 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl(r1, 0x2, &(0x7f0000000080)="10a6f35efd896dff9c8d0b5c43b181eb8abfcc8374f7f88324f9") sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0x3, 0x4) [ 320.066503][ T29] audit: type=1804 audit(1595941705.120:266): pid=15193 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/196/bus" dev="sda1" ino=16373 res=1 [ 320.156255][T15200] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 320.177307][ T29] audit: type=1804 audit(1595941705.120:267): pid=15193 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/196/bus" dev="sda1" ino=16373 res=1 13:08:25 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:25 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0xafc) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:25 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r4) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYRES64=r3, @ANYRES16=r4], 0x2, 0x0) r5 = dup3(r1, r0, 0x0) dup(r5) finit_module(r1, 0x0, 0x0) 13:08:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff01000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b4f9ff5f9597f471cbbdb1facb98c23e05c8abad81762e26dc49a413443706763894b79dfac917a40597c3c93498183a38e4ccf8dbc1b9587dfd7ae4492f7d26bb121826ede44497421eac94291734e44ac805e6762c4f0eed956ce26ceddac824f119331124b4174b22d61f69bb75d164c8881eabf0632f267430d7c48a4d1b6a638746124804f5b4835eada12532220b64866b04789bf244373b1ca20abb00bb9d3a783568518107fd6dbfe156bba4cf18b00baa5b5957f43fb4e8044a4192d4", @ANYRESHEX], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:25 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x4, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x3) r3 = dup(r2) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r6 = pidfd_getfd(r3, r5, 0x0) read$char_raw(r6, &(0x7f0000000200)={""/37681}, 0x9400) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) ioctl$F2FS_IOC_GET_PIN_FILE(r7, 0x8004f50e, &(0x7f0000000000)) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r8) sendmmsg$sock(r8, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f00000005c0), 0x1}}], 0x0, 0x400c800) ioctl$RTC_UIE_OFF(r1, 0x7004) [ 320.679824][T15215] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:08:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:25 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000100)=""/236) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) nanosleep(&(0x7f0000000080)={r3, r4+60000000}, &(0x7f00000000c0)) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:25 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0xe4000, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)="7e1776f77e1eb43d7d9d254d93bfcfc5875a7bd928c426444ca42b5c1a4385421b0e4139142104f7c0572becbf51dafe5ad38a", {0xfffffff7, 0x8, 0x34325241, 0x9, 0x7, 0x1ee, 0xb, 0x5}}) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x37}}}, 0x24) fcntl$setstatus(r0, 0x4, 0x44800) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) 13:08:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000280)={0xb6, &(0x7f00000001c0)="fb5b16c2db0d5f535cc2fb9e5d703bd62ce416f1f0bb8a9e2b0f77b98e8316a50d13d9e1a70d7dd836c782edf5a86cc9aebb8326dcbb6f3e8b3917005464da60665a5e5cda730d64cb46154b35a325e7a9afd14c9a7c8cfb8b8afa924a98b6be856ce689b72a8d6381460ad858d659795e3b515fc3f9fb4d0a03c86d273e31ab8e8796a79b88ba4b038e074bfc2797976eafb8ac51ac927d46c3f4ffc0e9bf85948018a6d69e656ef1d5cd11a14d096ed0554dd1c39f"}) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x400481, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0010310f4f048f6692ff6ad8b90a788de53310c2f3c9c52ddbac9bc6bed7eacc847f896962dbb626d00aa19876faee227e19fb0143a93fc144a280f40e3f99cf351ec26748c2cf4c14b9cb5516086649537a02ad5c6d66072ade3e8caf0ffc6aec97e287ef9dba8a01", @ANYRESOCT], 0x2, 0x0) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) ioctl$BLKRAGET(r3, 0x1263, &(0x7f0000000100)) 13:08:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 320.872035][T15235] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:26 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/9) [ 321.013338][T15235] 8021q: adding VLAN 0 to HW filter on device bond63 13:08:26 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:26 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) 13:08:26 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_generic(r4, &(0x7f0000002540)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x2380, 0x26, 0x400, 0x70bd26, 0x25dfdbff, {0xa}, [@nested={0xc0, 0x28, 0x0, 0x1, [@typed={0x14, 0x1e, 0x0, 0x0, @ipv6=@private0}, @generic="935efd0bae2698cc5d99ad3a9b994468933f72800de970d906483a5a43b310751ce2da49da7d7865033842f29962cd2af583fdd6b09e110fe6db3a99928cc70f4d70b88f8a4bd60b2c3be6ccb691bc6950467018dc9e1fbc72c9cf9cc35720957055d3f4323bbaf986aae1a0f564a7098d3d58749649bb56288a1b6f8e0a230af8482a405fa65a30f8f54aefbb0a28740a6c7c70dcd59a51e58103757bbc8de5084be820db5f3ae3"]}, @nested={0x20c2, 0x3, 0x0, 0x1, [@generic="7579cc90835251e3a04c5a9776b01b4348ef6aeed5995a1777ae71fda18ea84bcff89066f592d3bfb16a93f05715069bb2c1b9b00237aa6f0490dd8e9ca3c47bb470077b55aefa7d1faa6fa9f3643b3947245362f5d7d641f7bc3d8fac1c7e762117f30f536d68bd7ea926d839376ccc1c7aa713c93f95486cf16814aff0ed16e0282055b6a210875676f4a27b1862601b57721d64fefd53518156d3c373fee1e8a818365b307f91b3957ca9cf1b6636029484f189f7a86665b40d30d83c", @generic="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", @generic="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"]}, @nested={0x2c, 0x22, 0x0, 0x1, [@typed={0x14, 0x93, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@private2={0xfc, 0x2, [], 0x1}}]}, @generic="c57881a684f6f7111a28a9b5942c9d0049f7cfabc37155acc1145cc69b97d7208480875ace61346700d47c865591b6a6c928477aeac11587c910a97c17e30314d644ec655972becf97b6c9777d2aa9ecaa21f42d9ae1ed10ac59d849fd22bbd172dcfc53feeb2c4d1823440b652fadb27d1c1391a0fc10c6de7394591be033eab8a3efd0d9f120bca86c1bc1776bbc4167691c8b7db926f89bea039882ed35de", @generic="174c5f300ebb183d105f5057492060e18502edebaea58ab2d354d2abf22f05d5892229e8efbdf88c3c1133118e128518ae288bf324a0c29aef4b277427f481e5022745e5cf95baf0ab1e0e6dcdeedc0544d667b2ca62513be6ebf955bd9f25e5fba50af046f7234817665c2ccecccb3de2", @generic="cfc5e7da5acbd00c211e1b88e20e6fab76e76773137572bf6141492b7efe66857d946aff4033556c5556ae76581ebf1a3e4cba5644f5535e28f5fd2c413e68def911f60f129ee5cdb7f3855c935a8453a8e7be5af48cef9162478c9ac445493d84c4606e8dccb3fabb5ed0b823a5f3251cad876d988ab64b1d34f18a5121240f963094c32149ae47cf2fe2933d78520847f68552830f54b3de87f61df75b94b37099dd0e80546d6b88ee"]}, 0x2380}, 0x1, 0x0, 0x0, 0x4000}, 0x20000041) r5 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000002600)=ANY=[@ANYBLOB="009b2d020000cac1b66965431eaeb010c1e7cfd32b79f24ccbfb52653ac59d0484e73faad2a49452c7bcef8bea61eaf423a077a4b137357af922bbaba33e3be517aec3311f05af3015bd4385f6", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:26 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x1b) [ 321.628883][T15308] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 321.741412][T15308] 8021q: adding VLAN 0 to HW filter on device bond64 13:08:26 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$smackfs_label(r4, &(0x7f0000000040)={'**'}, 0x3) 13:08:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:27 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f0000000000), &(0x7f0000000100)=0x4) dup(r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x840, 0x0) sendmsg$nfc_llcp(r2, &(0x7f0000000600)={&(0x7f0000000180)={0x27, 0x1, 0x1, 0x4, 0x8, 0x1, "31948ed8d34352ed504fcba1ae1797c50678e8482f70c13a655757ab295194d42f1007b8d3d09e36be6775c3e93a268eabda26e37701026ab683ad0f2b26f6", 0x3f}, 0x60, &(0x7f0000000980)=[{&(0x7f00000002c0)="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", 0xfe}, {&(0x7f00000003c0)="43ddebac0b6f36a184b76c1aa1ef9aca7fa7c2462b35cebf678e2bf4461b811eba2b7b45ef761393c52693789556c8564853d35373c673ffc410bb51671cfcede7f311acd5e827239088ba66eaf002a1b7f45a7f1c5b17673fadf79ff1934043b8cceb280da8cf9917afa1cc3c09a3cb7fa6912f5b963c53208335769da675837cbac9c6ce3fa2ba16076bd53d6d120190418b55896245461f1c0866d3634856d5b50ce886433470cf59b0a2c9e6da71d6c920c6db2236bfe5b0064b85844a25111852dee2abf12494cccf275a511c22", 0xd0}, {&(0x7f0000000200)="913e413d6c2411de9903bf14a96d7391202fafbe0786a7fde8c2b689241845fdb9901c0ca8611d5469dcb2dcaa1e21e4e3a32ce0741097fa5f3f22b05247524bb3dda0fe0e74c809596bf0bb3b79973f884ca31d16efd850", 0x58}, {&(0x7f00000004c0)="732d470cc05075ff7dcb6695c4ca36fccb8b3f837962ff4ded5677c6132607eac90c190dea431c527784795acd092ee99f831c98478ae9daad76dc4a91e65f72c66bc8506592c28421fdba569f0f3a2cbfce2a09e3911645bc073317be01047bdefc839b106b0b71844c78c7cb6e002773aa29a063ddb19222b434a64977dc8472c2fcb7dc9c150c75195cec928f9df975db8e15e3ec9d041a62452919fd", 0x9e}, {&(0x7f0000000680)="54eea8eb1ef198164d9dce1b44b94bf0f595c141366f2f9ac3d14aaf1afe570cfad2b7a03f4c845cb595f02368421fff8e59214d1fec2168d757bb360ad6099a722ea32876eb90dd153fa9e10d50fe58061359f8c754d8faf81d85402107cea9d0fccb39eed4483e6a879552876cd341f465e526e5ed305dc5e1b1e4c0ff33a4900fe121e260a8282139d0ef5ba132bb0de904baf5b252f4fc3ce6746ef8c8b31e2bdfde72bfb8991405083fd802e190819643965408d517e6234ecf3465028207", 0xc1}, {&(0x7f0000000780)="57588a458117ef68251d0069c5f09448e653339414d4332eb65f03c82a9f84207f39c9fa62612c463a0a1cc82b8ee7dfea45e4a58dc8feb9cf9840c5f48120453f83d9573be67ba0b6a3a0383e0fb76fb95e94522d5508a459b2cb4c80", 0x5d}, {&(0x7f0000000580)="cb98b475badfd9b0837d47aee2b0dfa0268281f52b0f", 0x16}, {&(0x7f0000000800)="4f1c91d65779e7294122e04e875d07bb8e202eac8a80820a21dcb572e20ed03b5f6c21f4be6cea370992451f0afb1e43e11b7817438dec689e934fc412847d153ef5f75939629eb702f9d9bfe2361ac173dcddc2b2f3c4c50e401c38b934302e7d5284036035b79795b06168c4463fdf5fb4032db56b672b16ddcf89ec556e9977750fd88d57940b5485a07e7be8190531318ec28a9c5f5da445e1bc472a157010e70c82d3dad76538cbb80e6ea23c5d9ffe86e5c2e70e0a59e63fd7acf313a6add187907cf47aa26e66e160e3680df3fc570feffd65b25b843fe08b52a47ca431829cbbd91f237b2be2e0cb", 0xec}, {&(0x7f0000000900)="a580257576219afec85dbb69aa6029518d08f00aaa998d7cb533f89a5218a1d42fe6c4f81fec3b65842d5c852677a05b31704f751c54759f73a3382a5340fe5389874f62b6b6ffa25a66a455166ab9151c9bee164bcee3cc38edfa49e4b436edc0343e83507a87828bd86bd0307b1840f0ca0e4e0c66db", 0x77}], 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0xe8, 0x8000}, 0x40) r3 = dup(0xffffffffffffffff) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000001, 0x10010, r3, 0xfffffffffffffff8) write$char_usb(r3, &(0x7f0000000080)="30e432a5a008689b3ff35723d3e897363848e75a4db0b4dac4b0bb9c39ea1f90b45ba0ddc76d9a097023117746ea22daf23b7a9fce7337d3be0f082df858f1b0097dbe72649c526b4dbabfee0cca94cd135ee8ee77e58203188b5212844e3045b34c98dc", 0x64) 13:08:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet(0x2, 0x80000, 0x1f) signalfd(r1, &(0x7f0000000040)={[0xfffffffffffffff9]}, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xb1f55082c66ddca9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0xd, 0x6, 0x101, 0x0, 0x0, {0x7, 0x0, 0x1}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40080}, 0x48000) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 322.216498][T15387] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 322.255101][T15387] 8021q: adding VLAN 0 to HW filter on device bond65 13:08:27 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:27 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000140)={0xd000}) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000100)={0x4e, 0x3, 0x21f83480, 0x5, 0xae}) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:27 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, &(0x7f0000000240)=0x2) r2 = dup(r1) sendmmsg$sock(r2, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) pipe(&(0x7f0000000380)={0xffffffffffffffff}) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x80, @dev={0xfe, 0x80, [], 0x2f}}]}, &(0x7f0000000300)=0x10) r6 = dup3(r5, r4, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x7d, &(0x7f0000000000)={r7}, 0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={r7, @in={{0x2, 0x4e22, @broadcast}}}, &(0x7f0000000200)=0x84) fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@random={'system.', ':\x00'}, &(0x7f00000003c0)=""/177, 0xb1) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) 13:08:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x280580) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) dup3(r5, r4, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x43) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x7d, &(0x7f0000000000)={r6}, 0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={r6, 0x1743}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000000c0)={r7, 0x200, 0x30}, &(0x7f0000000100)=0xc) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={0x0, 0x5}, 0x8) write$P9_RREADDIR(r0, &(0x7f0000000040)=ANY=[], 0x2) 13:08:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x0, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:27 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400001, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000080)=0x1) 13:08:27 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x1) [ 322.681495][T15456] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$rds(r1, &(0x7f0000000100)={0x2, 0x4e24, @empty}, 0x10) r2 = open(&(0x7f0000000000)='./bus\x00', 0x101142, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x40) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6, 0x2, 0x8, 0x3, 0x0, 0x800, 0x40, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1e94, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x6a1, 0x100000001, 0xf9, 0x0, 0x1202, 0x9, 0x7}, r5, 0xe, r2, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x7a0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RREADDIR(r2, &(0x7f0000000100)=ANY=[], 0x2) [ 322.734529][T15456] 8021q: adding VLAN 0 to HW filter on device bond66 13:08:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000140)='./file1\x00', 0x7, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="405f2bf8e348a714c738d76c25d1", 0xe, 0x10000}, {&(0x7f00000001c0)="dc82e99a1828f05d4b412e08bf28e3939fa75c30089654469096a31005d5", 0x1e, 0x8}, {&(0x7f00000002c0)="80163cdfa8568ed9efc1006ee1c7c995570583150d63298c75cb737d2e694d74c1cb10b7df0318d9f8d5bb6d90e5f5c2f1f616f72274bf325fb783006370feebf9874b37843eb82e8f438d23f73fd12b19315dcf5e4563a89f3d4a40c838924556686867eb585743f1d9aa5921f93ca033213d87e4ed3b7e398830b79c1959c7543ec682f99665fd47ae63455f938ca0572fee03ff50b79c2a21fffffd9481548d8db3da714e77361ddb2b5bed630eefe06d7fc7f16b8fb09df195", 0xbb, 0x6}, {&(0x7f0000000380)="0cbc0aa254959fc6275a25c0d05d88cabb10d1dae0699fbfee7125acf47b71a2d578b4edcf8dd256b9e31fd8b93cdbbd1d3ab2f497b24c4fb3f50532f435d85012fed74c1830d535eaf2f4911f5dcf5710da9023e4d414b95fdd13b314503c4e249d3eef725b3d56e28c4b9f989aa6393b2a7902a0e61161c52b68250abfd249b688b401a13444937aea967d290765ae1c0b69ac8ee441dd7478e3f56f4c89a9028bb2ef2492267cd482de67d276b4d844882b41f076132e19b28a436b3ae8990878", 0xc2, 0xfffffffffffffffd}, {&(0x7f0000000200)="e0e1c6fd403412f9ab08", 0xa, 0x100000001}, {&(0x7f0000000480)="b62b5c3f96ad2b8f3173341d98bb04eca166d4c3f6ed4a8874bd6ff2e3a36c923e2bd83c7223d51c948cf4bb8dbf65676eba98f02b5b8cc42452d66930c8f644db2810900ddc517832f246705a55805df0c2a25c3b8cf589fa22cb56b8badca24cb19e1f0ac6abd07b4533b84c33a21fb0e205cd", 0x74, 0xfffffffffffffffc}], 0x11400, &(0x7f0000000680)={[{@inode_cache='inode_cache'}], [{@fsname={'fsname'}}, {@obj_role={'obj_role', 0x3d, '-^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x0, 0x63, 0x38, 0x63, 0x31, 0x64, 0xfa3ff7c4d34d1296], 0x2d, [0x39, 0x61, 0x34, 0x64], 0x2d, [0x66, 0x32, 0x66, 0x64], 0x2d, [0x62, 0x30, 0x62, 0x37], 0x2d, [0x65, 0x64, 0x65, 0x37, 0x62, 0x30, 0x65, 0x65]}}}]}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) sendmmsg$sock(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000080)={0x0, 0x70, 0x1, 0x9, 0x7, 0xbc, 0x0, 0x4, 0x104, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x22c3, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x1880, 0x3, 0x1000, 0x6, 0x3, 0x7fffffff, 0x7f}) 13:08:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x2d00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="3400000086b39611c67f58bfd4406574ff949a3bb1d92e4da6f35fbdc4c9c86920f742ca73235ddcb3e1639a8419adb96fa802446c0a78e36f09c765589fe07827c4938a3ab7189a9e394b36b67b20c6b60cd357ff2aa7384363a00a00f1b198672f072f6376", @ANYRES16=r2, @ANYBLOB="0100000000000000000001000000000000000241000000180017000000000000000069620a6970766c616e310000"], 0x34}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r2, 0x8, 0x70bd2d, 0x25dfdbfb, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x801}, 0x40805) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) 13:08:28 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:28 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) pipe(&(0x7f0000000380)={0xffffffffffffffff}) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r6 = dup3(r5, r4, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x7d, &(0x7f0000000000)={r7}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000100)={r7, 0x4b}, 0x8) 13:08:28 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 13:08:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x3500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:28 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) [ 323.471325][T15540] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 323.494820][ T29] kauditd_printk_skb: 9 callbacks suppressed 13:08:28 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f0000000000), &(0x7f0000000100)=0x4) dup(r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x840, 0x0) sendmsg$nfc_llcp(r2, &(0x7f0000000600)={&(0x7f0000000180)={0x27, 0x1, 0x1, 0x4, 0x8, 0x1, "31948ed8d34352ed504fcba1ae1797c50678e8482f70c13a655757ab295194d42f1007b8d3d09e36be6775c3e93a268eabda26e37701026ab683ad0f2b26f6", 0x3f}, 0x60, &(0x7f0000000980)=[{&(0x7f00000002c0)="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", 0xfe}, {&(0x7f00000003c0)="43ddebac0b6f36a184b76c1aa1ef9aca7fa7c2462b35cebf678e2bf4461b811eba2b7b45ef761393c52693789556c8564853d35373c673ffc410bb51671cfcede7f311acd5e827239088ba66eaf002a1b7f45a7f1c5b17673fadf79ff1934043b8cceb280da8cf9917afa1cc3c09a3cb7fa6912f5b963c53208335769da675837cbac9c6ce3fa2ba16076bd53d6d120190418b55896245461f1c0866d3634856d5b50ce886433470cf59b0a2c9e6da71d6c920c6db2236bfe5b0064b85844a25111852dee2abf12494cccf275a511c22", 0xd0}, {&(0x7f0000000200)="913e413d6c2411de9903bf14a96d7391202fafbe0786a7fde8c2b689241845fdb9901c0ca8611d5469dcb2dcaa1e21e4e3a32ce0741097fa5f3f22b05247524bb3dda0fe0e74c809596bf0bb3b79973f884ca31d16efd850", 0x58}, {&(0x7f00000004c0)="732d470cc05075ff7dcb6695c4ca36fccb8b3f837962ff4ded5677c6132607eac90c190dea431c527784795acd092ee99f831c98478ae9daad76dc4a91e65f72c66bc8506592c28421fdba569f0f3a2cbfce2a09e3911645bc073317be01047bdefc839b106b0b71844c78c7cb6e002773aa29a063ddb19222b434a64977dc8472c2fcb7dc9c150c75195cec928f9df975db8e15e3ec9d041a62452919fd", 0x9e}, {&(0x7f0000000680)="54eea8eb1ef198164d9dce1b44b94bf0f595c141366f2f9ac3d14aaf1afe570cfad2b7a03f4c845cb595f02368421fff8e59214d1fec2168d757bb360ad6099a722ea32876eb90dd153fa9e10d50fe58061359f8c754d8faf81d85402107cea9d0fccb39eed4483e6a879552876cd341f465e526e5ed305dc5e1b1e4c0ff33a4900fe121e260a8282139d0ef5ba132bb0de904baf5b252f4fc3ce6746ef8c8b31e2bdfde72bfb8991405083fd802e190819643965408d517e6234ecf3465028207", 0xc1}, {&(0x7f0000000780)="57588a458117ef68251d0069c5f09448e653339414d4332eb65f03c82a9f84207f39c9fa62612c463a0a1cc82b8ee7dfea45e4a58dc8feb9cf9840c5f48120453f83d9573be67ba0b6a3a0383e0fb76fb95e94522d5508a459b2cb4c80", 0x5d}, {&(0x7f0000000580)="cb98b475badfd9b0837d47aee2b0dfa0268281f52b0f", 0x16}, {&(0x7f0000000800)="4f1c91d65779e7294122e04e875d07bb8e202eac8a80820a21dcb572e20ed03b5f6c21f4be6cea370992451f0afb1e43e11b7817438dec689e934fc412847d153ef5f75939629eb702f9d9bfe2361ac173dcddc2b2f3c4c50e401c38b934302e7d5284036035b79795b06168c4463fdf5fb4032db56b672b16ddcf89ec556e9977750fd88d57940b5485a07e7be8190531318ec28a9c5f5da445e1bc472a157010e70c82d3dad76538cbb80e6ea23c5d9ffe86e5c2e70e0a59e63fd7acf313a6add187907cf47aa26e66e160e3680df3fc570feffd65b25b843fe08b52a47ca431829cbbd91f237b2be2e0cb", 0xec}, {&(0x7f0000000900)="a580257576219afec85dbb69aa6029518d08f00aaa998d7cb533f89a5218a1d42fe6c4f81fec3b65842d5c852677a05b31704f751c54759f73a3382a5340fe5389874f62b6b6ffa25a66a455166ab9151c9bee164bcee3cc38edfa49e4b436edc0343e83507a87828bd86bd0307b1840f0ca0e4e0c66db", 0x77}], 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0xe8, 0x8000}, 0x40) r3 = dup(0xffffffffffffffff) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000001, 0x10010, r3, 0xfffffffffffffff8) write$char_usb(r3, &(0x7f0000000080)="30e432a5a008689b3ff35723d3e897363848e75a4db0b4dac4b0bb9c39ea1f90b45ba0ddc76d9a097023117746ea22daf23b7a9fce7337d3be0f082df858f1b0097dbe72649c526b4dbabfee0cca94cd135ee8ee77e58203188b5212844e3045b34c98dc", 0x64) [ 323.494830][ T29] audit: type=1804 audit(1595941708.550:277): pid=15541 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/202/bus" dev="sda1" ino=16379 res=1 [ 323.550041][T15540] 8021q: adding VLAN 0 to HW filter on device bond67 13:08:28 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x41) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000001, 0x11, r0, 0xab) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_io_uring_complete(0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40400, 0x0) write$P9_RREADDIR(r3, &(0x7f00000002c0)=ANY=[@ANYRESDEC, @ANYBLOB="84f14446f90012385f967e39bc469bbb0d04508905b3c48c914ff9cc6e08286bec3dc6b5d0d95cb5826054a63ec324eee5f6a2a7a058b4345fa1154b80d180dfa8f02e79ea593750c99e083011f76d31bb3e5da10fe6f6e0f296a37023ef8576d5d06a642634baf9ff2328b05a54eadb8296af0623fbeb2750ea084ad2f48bcf136a37bd3fc2e77910086b9d0739ebea040697b48d2e3d2a75fbbbc9e5d996770ffa1af4a7c4bcb10ed3061eae7ac61f919753fdcb00b5bbc20c685b0ef1c1ef3f395a137e836315", @ANYBLOB="f4bbab72d23d4aa32bc57d1f748466422f67bee8231ac3e88642f94726e8b42decda18304158b970b4f05c565e667b096d48d942d727dc213ffd4a2dea48462976ed97a9aa931ebd8e0c635af41fe2baa5e78d6c1d81ae44b77f9f10e543084a296709164e41372ed1204847a76f1d24b8883d59de73cca107210b4c1194491a1fa5b1adbe15bd28fd53506c1a39058f5ab1bd5d7ed0f3f8cafd095c18bb0be52ea404725cc8b06b219dd83633b76c9a06477de1b12225066dfd9133eb29a9f1fb0ce12b881b5b783547b09eaab5c42466aeb0f909c80c554d9b88162842719e4c8212a0d890a203cc876511527cde40b21dfd827f62a472156e7b89768016d596273eca0e917c1e1154ff59a7b20a4c04d254cd12db83028ada772a1b97302af86efc403940cfe9a8ab780d4628a02eebad920e93b9bb1cffa4b30601d98abf83922341bf4dae7200f8afa1b07651"], 0x2) 13:08:28 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) dup3(r1, r8, 0x0) finit_module(r1, 0x0, 0x0) [ 323.727792][ T29] audit: type=1804 audit(1595941708.630:278): pid=15541 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/202/bus" dev="sda1" ino=16379 res=1 13:08:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x400800, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000000)={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @private=0xa010101}, 0xc) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) lseek(r0, 0xfffffffffffffff9, 0x1) [ 323.840314][ T29] audit: type=1804 audit(1595941708.880:279): pid=15601 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/203/bus" dev="sda1" ino=16383 res=1 13:08:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x400800, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000000)={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @private=0xa010101}, 0xc) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) lseek(r0, 0xfffffffffffffff9, 0x1) [ 323.915721][ T29] audit: type=1804 audit(1595941708.970:280): pid=15601 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/203/bus" dev="sda1" ino=16383 res=1 13:08:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:29 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x482640, 0xd6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:29 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x400800, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000000)={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @private=0xa010101}, 0xc) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) lseek(r0, 0xfffffffffffffff9, 0x1) 13:08:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:29 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000100)={r0, 0x1, 0xfffffffffffff000, 0xffffffffffff7000}) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r7) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KDGKBENT(r8, 0x4b46, &(0x7f00000003c0)={0x0, 0x8, 0xfff8}) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@flushpolicy={0x15c, 0x1d, 0x20, 0x70bd29, 0x25dfdbff, "", [@policy={0xac, 0x7, {{@in=@remote, @in6=@private1, 0x4e21, 0x8001, 0x4e23, 0x1, 0xa, 0x20, 0x80, 0x3c, 0x0, r7}, {0x6, 0x8, 0x2, 0xfff, 0x1, 0x0, 0x34, 0x2}, {0x8000, 0x58, 0x7fff, 0xf4f}, 0x7, 0x6e6bba, 0x2, 0x0, 0x2, 0x3}}, @coaddr={0x14, 0xe, @in6=@private0}, @extra_flags={0x8, 0x18, 0x2}, @algo_crypt={0x7a, 0x2, {{'xts-twofish-3way\x00'}, 0x190, "0785c2986f7f9589c1568d54a0b82b650d8fc10e8fc1d3965aebf500f69cb7821636c8f3e02df50d6b9496b15e70683a5d99"}}, @extra_flags={0x8, 0x18, 0x4}]}, 0x15c}, 0x1, 0x0, 0x0, 0x8000}, 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 324.411416][T15630] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 324.430140][ T29] audit: type=1804 audit(1595941709.480:281): pid=15633 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/204/bus" dev="sda1" ino=16380 res=1 13:08:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x80002, 0xb) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x20, r4, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7f}]}, 0x20}, 0x1, 0x0, 0x0, 0x4081}, 0x2002005c) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x2c, r4, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x10001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r5 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x54, r7, 0x1, 0x0, 0x0, {0x41}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_GET(r5, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r7, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x70}, 0x1, 0x0, 0x0, 0x8800}, 0x20000800) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2020, 0x1) 13:08:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x5c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 324.567411][T15630] 8021q: adding VLAN 0 to HW filter on device bond68 [ 324.593371][ T29] audit: type=1804 audit(1595941709.650:282): pid=15633 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/204/bus" dev="sda1" ino=16380 res=1 13:08:29 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x8000, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) sendmmsg$sock(r2, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) mmap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1, 0x13, r0, 0xf7e4b000) ioctl$BLKROSET(r5, 0x125d, &(0x7f0000000180)=0x8) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_PREPARE(r7, 0x4140, 0x0) bind$can_raw(r2, &(0x7f0000000300), 0x10) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x101, @mcast1}}}, 0x90) 13:08:29 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000080)=0x3) r4 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_SUPPORTED_CPUID(r4, 0xc008ae05, &(0x7f0000000040)=""/44) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x6401000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:29 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x83) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000ffb000/0x2000)=nil) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0xa00, 0x0) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000140)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fee000/0x12000)=nil, 0x1000, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:30 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x8) [ 325.060851][T15718] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 325.151990][T15718] 8021q: adding VLAN 0 to HW filter on device bond69 13:08:30 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:30 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x521402, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:30 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r4, 0xc0845658, &(0x7f0000000040)={0x0, @reserved}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0x3ff, &(0x7f0000000140)=0x4) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x8c000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f00000001c0)={{0x0, 0x0, 0x3ff, 0x2, 0xe4c}, 0x8, 0xfff, 0x2}) tkill(r2, 0x1e) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)={0x8000}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000100)="2e00000033000535a4abd32b8018007a0124fc60100002400c000200053582c137153e370900018004001d00d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x4c}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x203, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x1, 0x80000001, 0x0, 0x1, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$kcm(0x10, 0x2, 0x10) 13:08:30 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e0005000300000000000300f88000f01700d00000000000000000", 0x2e}], 0x1, 0x0, 0x30}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x8000000000000010, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4004, 0x800000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:08:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:30 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000040)={0x8001, 0x6, 0x4, 0x5, 0x13, "7bc76a7867da4973"}) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) sendmmsg$sock(r6, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$MEDIA_REQUEST_IOC_QUEUE(r6, 0x7c80, 0x0) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000180)={{0x12, 0x1, 0x101, 0x0, 0x0, 0x0, 0xff, 0x79, 0x1803, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xf5, 0x50, 0x20, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x40, {0x9, 0x21, 0x3f, 0xe8, 0x1, {0x22, 0xac3}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x3, 0x0, 0x1}}}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f00000001c0)={0xa, 0x6, 0x250, 0x1, 0x2, 0x0, 0x20, 0x2}, 0x5, &(0x7f0000000200)={0x5, 0xf, 0x5}, 0x6, [{0x8e, &(0x7f0000000240)=@string={0x8e, 0x3, "54fd7a080850d0824b31b34e72d9c2b39692db680c81c0aac7c6979bcb476b28b76f1f78650aff89423583459218f9c2ecdc522b4fea6a6c521014c8d0617efb1b2e6337d14d65b3e961f99325da94cd5fcad4e595cc09ce8996be6843b10e85800e81c329755d31ece5bb5b6a757bf58c5725a895f064cb3823f73eac4ecd2b8f3abb6580c7f503eb7fdf9d"}}, {0x18, &(0x7f0000000300)=@string={0x18, 0x3, "33b2edb9cc38bb15387eabedc830e5951f166895577a"}}, {0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0x439}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x3801}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x41f}}, {0xf0, &(0x7f0000000400)=@string={0xf0, 0x3, "8de6d707d7ce02d474b93b3b07ded258d12a1eb428047d39d523e92072ad603cfdbe7a4fb4fecd8aa4e097a534d0409fa160daa688189d8a539543d7dcfffe72a3ccd0228e9456ee67e3dd633e1200a858535ff28f86310cf1993b21c779a6da4d8b56bc51bc8ea82d352c5c5e493c360fbdefd1700d5f38525fbe09d522f5d4f57815533130b77dcf6be7641899856a59ab72c9f85ee9e12aadcd39399892152b63e06eb7d0bec7359bde4e0d8c201ca6c1f1e51e3ee90909f9296ff35e2c75d2bdc50ffd8137945c4c79d060f0e703f1330bddcc2cce7c17da3abb7473030581c4bd6479168a86511b201f746b"}}]}) lstat(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)) 13:08:30 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(r1, 0x4604, &(0x7f0000000240)={0x8, 0x5, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x1600, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xc601000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 325.530558][T15787] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 325.582977][ T29] audit: type=1804 audit(1595941710.630:283): pid=15792 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/207/bus" dev="sda1" ino=16383 res=1 [ 325.641572][T15787] 8021q: adding VLAN 0 to HW filter on device bond70 [ 325.655761][T15802] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 325.686686][ T29] audit: type=1804 audit(1595941710.720:284): pid=15792 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/207/bus" dev="sda1" ino=16383 res=1 13:08:30 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$KVM_GET_MSRS(r5, 0xc008ae88, &(0x7f0000000100)={0x1, 0x0, [{}]}) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 325.816031][ T29] audit: type=1804 audit(1595941710.870:285): pid=15847 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/208/bus" dev="sda1" ino=16383 res=1 13:08:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xf0ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 325.951671][T15802] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 325.967632][ T29] audit: type=1804 audit(1595941711.020:286): pid=15847 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/208/bus" dev="sda1" ino=16383 res=1 13:08:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:31 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e0005000300000000000300f88000f01700d00000000000000000", 0x2e}], 0x1, 0x0, 0x30}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x8000000000000010, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4004, 0x800000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:08:31 executing program 1: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x84) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) sendmmsg$sock(r2, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000100)={{0x0, 0xd}, 0x0, 0x0, 0x7fff, {0x4, 0xff}, 0x0, 0x9}) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v1={0x1000000, [{0x2000, 0x80000001}]}, 0xc, 0x3) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040a", @ANYRESOCT], 0x2, 0x0) dup3(r3, r0, 0x0) finit_module(r3, 0x0, 0x0) 13:08:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:31 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) write$P9_RWRITE(r0, &(0x7f0000000040)={0xb, 0x77, 0x2, 0x4}, 0xb) [ 326.257683][T15872] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:31 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e0005000300000000000300f88000f01700d00000000000000000", 0x2e}], 0x1, 0x0, 0x30}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x8000000000000010, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4004, 0x800000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 326.354369][T15872] 8021q: adding VLAN 0 to HW filter on device bond71 [ 326.390946][T15867] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 13:08:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000840)={0x24, r5, 0xf, 0x0, 0x0, {0x11}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_VLANID={0x6}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r5, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4090}, 0x40) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r7 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="040b", @ANYRESOCT, @ANYRES32=r6, @ANYBLOB="774d9634a2dc1786586d3ffa71d2c46574307337548e41f48eacdb0bffe35924f1b3df2be0c6f647a4259f7dcfa6c3904a3502e22cdcf3bd99c44a8dc102ebbfecd2cacbbab3b7d050d797dd7df2ffc0d0398ba60ca285721dc4be5f1ac1945b796e8e20b178b869f8330dbe70c81f88629d8fba4861f52c96dd0c15093e8c15bc0f922f99a9ec429b4edbd1b1fe3d7c934bdaa0ed52917dc2319b756d00ac958156e6c0f2c03aa410f8884389c7d8448c4133bd40e801cc722957", @ANYRESOCT=r8], 0x2, 0x2) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x14000, 0x0) openat(r10, &(0x7f0000000100)='./bus\x00', 0x200, 0x20) dup3(r7, r6, 0x0) finit_module(r7, 0x0, 0x0) 13:08:31 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) getsockopt$PNPIPE_IFINDEX(r4, 0x113, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000040)=0x3) 13:08:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfa03000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 326.776728][T15928] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 13:08:31 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x460080, 0x0) openat(r2, &(0x7f0000000140)='./bus\x00', 0x4000, 0x40) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="05ac", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:32 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e0005000300000000000300f88000f01700d00000000000000000", 0x2e}], 0x1, 0x0, 0x30}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x8000000000000010, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4004, 0x800000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:08:32 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x46a240) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0xffffffffffff8000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x2) 13:08:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfb03000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:32 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r1, @ANYRES16=r2, @ANYRES32=r3], 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[], 0x2, 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 327.228981][T15974] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:32 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x501002, 0x0) dup(r3) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) dup(r4) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) sendmmsg$sock(r6, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) write$P9_RREADDIR(r0, &(0x7f00000000c0)=ANY=[@ANYRES64=r3, @ANYRESOCT=r6, @ANYRES16=r1], 0x2) 13:08:32 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 327.354913][T15974] 8021q: adding VLAN 0 to HW filter on device bond72 13:08:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:32 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x101000, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r5, 0x1, 0x0, 0x0, {{}, {0x0, 0x4102}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0xa, 'ipvlan1\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r5, 0x100, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x18, 0x13, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}}, ["", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x41000}, 0x40) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 327.618876][T15976] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 13:08:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 327.781348][T16048] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 327.858116][T16048] 8021q: adding VLAN 0 to HW filter on device bond73 13:08:33 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:33 executing program 1: getpid() r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[], 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) poll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x200c}, {r5, 0x2a0}, {0xffffffffffffffff, 0x9034}, {r7, 0x1000}, {r2, 0x20}, {r9, 0x80}, {r0, 0x2064}], 0x7, 0x7ff) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:33 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e0005000300000000000300f88000f01700d00000000000000000", 0x2e}], 0x1, 0x0, 0x30}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x8000000000000010, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) 13:08:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xff03000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 328.354309][T16108] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 13:08:33 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e0005000300000000000300f88000f01700d00000000000000000", 0x2e}], 0x1, 0x0, 0x30}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x8000000000000010, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='rdma.current\x00', 0x0, 0x0) 13:08:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xffff1f0000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:33 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000100)) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r5, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r6, 0x1, 0x70bd27, 0x25dfdbfc, {{}, {}, {0x8, 0x11, 0x6}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8}, 0x8000) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = creat(&(0x7f0000000140)='./bus\x00', 0x41) accept4$rose(r8, &(0x7f00000001c0)=@full={0xb, @dev, @netrom, 0x0, [@default, @default, @rose, @netrom, @bcast, @rose]}, &(0x7f0000000200)=0x40, 0x800) dup(r7) dup3(r1, r2, 0x0) finit_module(r1, 0x0, 0x0) 13:08:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 328.528876][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 328.528885][ T29] audit: type=1804 audit(1595941713.580:302): pid=16122 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/216/bus" dev="sda1" ino=16379 res=1 [ 328.587582][T16128] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 13:08:33 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x8) r1 = open(&(0x7f0000000140)='./file0\x00', 0x38280, 0x15c) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x40) ptrace$setregs(0xffffffffffffffff, r4, 0x67, &(0x7f0000000040)="f9a3c1ba5c0d8e60") ptrace$cont(0x7, r4, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000100)={0x2, r4}) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 328.665800][T16129] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 328.722906][ T29] audit: type=1804 audit(1595941713.600:303): pid=16122 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/216/bus" dev="sda1" ino=16379 res=1 13:08:33 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e0005000300000000000300f88000f01700d00000000000000000", 0x2e}], 0x1, 0x0, 0x30}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x8000000000000010, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 328.802323][T16129] 8021q: adding VLAN 0 to HW filter on device bond74 13:08:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 328.869809][ T29] audit: type=1804 audit(1595941713.600:304): pid=16126 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/216/bus" dev="sda1" ino=16379 res=1 13:08:34 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 329.027629][ T29] audit: type=1804 audit(1595941713.600:305): pid=16126 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/216/bus" dev="sda1" ino=16379 res=1 [ 329.158046][T16177] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 13:08:34 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e0005000300000000000300f88000f01700d00000000000000000", 0x2e}], 0x1, 0x0, 0x30}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x8000000000000010, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) 13:08:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:34 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) sendmmsg$sock(r3, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f00000001c0)={0x7, 0x6, 0x4, 0xe000, 0x6, {0x77359400}, {0x2, 0x1, 0x4, 0x3f, 0x0, 0x0, "a0bf153e"}, 0x5, 0x3, @userptr=0x9, 0x2, 0x0, r5}) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) r8 = dup2(0xffffffffffffffff, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0403", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) bind$rds(r8, &(0x7f0000000100)={0x2, 0x4e22, @private=0xa010102}, 0x10) dup2(0xffffffffffffffff, r0) [ 329.318061][T16197] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 329.401079][T16197] 8021q: adding VLAN 0 to HW filter on device bond75 [ 329.445557][ T29] audit: type=1804 audit(1595941714.500:306): pid=16236 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/218/bus" dev="sda1" ino=16380 res=1 [ 329.457471][T16235] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 329.489763][ T29] audit: type=1804 audit(1595941714.540:307): pid=16236 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/218/bus" dev="sda1" ino=16380 res=1 13:08:34 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x40) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) ioprio_set$pid(0x2, r4, 0x4004) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 329.646803][ T29] audit: type=1804 audit(1595941714.700:308): pid=16250 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/219/bus" dev="sda1" ino=16380 res=1 13:08:34 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e0005000300000000000300f88000f01700d00000000000000000", 0x2e}], 0x1, 0x0, 0x30}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x8000000000000010, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) 13:08:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xffffffffffffff0f, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:35 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$BLKROGET(r8, 0x125e, &(0x7f0000000100)) 13:08:35 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e0005000300000000000300f88000f01700d00000000000000000", 0x2e}], 0x1, 0x0, 0x30}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x8000000000000010, 0xffffffffffffffff, 0x0) 13:08:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 330.059925][ T29] audit: type=1804 audit(1595941715.110:309): pid=16266 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/220/bus" dev="sda1" ino=15939 res=1 [ 330.106149][T16271] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:35 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="f6ae25e2fbc395cbc7a629ae98fa05", @ANYRESOCT], 0x2, 0x0) r4 = dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r4, 0xc040563d, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x1, {0x62a, 0x5, 0x78b5be84, 0x98}}) [ 330.213856][ T29] audit: type=1804 audit(1595941715.130:310): pid=16266 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/220/bus" dev="sda1" ino=15939 res=1 [ 330.328342][T16271] 8021q: adding VLAN 0 to HW filter on device bond76 [ 330.340146][ T29] audit: type=1804 audit(1595941715.370:311): pid=16315 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/221/bus" dev="sda1" ino=16033 res=1 13:08:35 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e0005000300000000000300f88000f01700d00000000000000000", 0x2e}], 0x1, 0x0, 0x30}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 13:08:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:35 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e0005000300000000000300f88000f01700d00000000000000000", 0x2e}], 0x1, 0x0, 0x30}, 0x40000) 13:08:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:35 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./bus\x00', 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) r8 = dup2(r6, r4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:36 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) 13:08:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 330.915541][T16341] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 331.088654][T16341] 8021q: adding VLAN 0 to HW filter on device bond77 13:08:36 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) 13:08:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:36 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) r4 = dup3(r1, r2, 0x0) connect$netrom(r4, &(0x7f00000001c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0xfffffffffffffffe, &(0x7f0000000100)) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r5 = dup3(0xffffffffffffffff, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 331.517379][T16413] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 331.684055][T16413] 8021q: adding VLAN 0 to HW filter on device bond78 13:08:36 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='\'\v', @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:36 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x8, 0x6, 0xfd, 0x0, 0x0, 0x3, 0x4, 0xb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x26, 0x0, 0xfffffffd, 0x8, 0x7, 0x4, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 13:08:36 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:37 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f00000007c0)=0x0, &(0x7f0000000800)=0x4) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000840)={@remote, r3}, 0x14) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="e13b3e6f", @ANYRES16=r6, @ANYBLOB="0100000000000000000001000000000000000241000000180017000000000000000069620a6970766c616e310000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r6, 0x4, 0x70bd25, 0x25dfdbfc, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$VIDIOC_G_AUDIO(0xffffffffffffffff, 0x80345621, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000100)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000300)=ANY=[@ANYRESOCT=r0, @ANYRES64=r4, @ANYBLOB="aeaf9f87bee293f2b568229ee9ef3632202f18cb19bfa94127cccedf7e06dbe9cc0d6c77080f353aab7eb3a432bc050f151097dfa63e2b2f52519dcb442a18ff8d9887b14ba2febc62e0b8d166cc7e2369c9d19fae99ebee018699bb906daba9bb0024c56d9e2c96a5b78a8846f9bc3cb778383a087f3942dc83d727e713ea1cc6a6e632a982eddc0ce19558f937ce8193dced2cae1828e5c3ad24f181b970438b71751fd239c93984603178682cf497857d58e9d6056c39af0690900f5cc8f7328ad915845afb4e95948b3408c1541bd264851627cc9c1c3f92f39e17a11d3c", @ANYBLOB="d750378b1c49b36f7952df0ca24b61", @ANYRESOCT], 0x2, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x3) 13:08:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:37 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') gettid() 13:08:37 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x40) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x501200, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r0, &(0x7f0000000140)={r5, r6, 0x3}) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r5 = dup3(0xffffffffffffffff, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:37 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 332.279130][T16490] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 332.419273][T16490] 8021q: adding VLAN 0 to HW filter on device bond79 13:08:37 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\xdb({!,@],\x00', 0x2) 13:08:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:37 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000140)={{0x1, 0x0, @reserved="f52315bdbe79d8be8d69503414ff6d3bc248e0ef74eb273f50f5ad4f0d30cffb"}}) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000080)='./bus/file0\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:37 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:37 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r5 = dup3(0xffffffffffffffff, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 332.804397][T16556] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 332.876351][T16556] 8021q: adding VLAN 0 to HW filter on device bond80 13:08:38 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:38 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0xe0100, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r6 = dup3(r5, r4, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x7d, &(0x7f0000000000)={r7}, 0xc) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000001c0)={r7, 0xf0000000, 0xffffffe0, 0x3, 0x8, 0x1f, 0xfe01, 0x7, {0x0, @in6={{0xa, 0x4e22, 0x7fffffff, @private0, 0x3f}}, 0x8001, 0x0, 0xfffffc01, 0x401, 0x8}}, &(0x7f0000000100)=0xb0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r8, 0x1, 0x20}, 0xc) r9 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:38 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r3, 0xc06c4124, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:38 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xd, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 333.378282][T16630] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 333.459700][T16630] 8021q: adding VLAN 0 to HW filter on device bond81 13:08:38 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) sendmmsg$sock(r2, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200b100cdcbb5378f0aa916072b849b3085e57c05243a17d8a725741976848a04b5289fe8dc898b8cbb069c33290584e0e96e3b773eb942991b73aa6f2a4dfd3c9dc84ce422df50577f48fa8da7dfa977cec1d1edc53e799437250155577c7828b550109721a7b055e851bb603e8f85e617ab8717c381f4192c8625459f29a1e4159432ceab04e5a99b85ec4331572573aad64351e068c0544b06a77d64d132ab5c8e30efaf99"]) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x40) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x10000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r3, r0, 0x0) finit_module(r3, 0x0, 0x0) 13:08:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:38 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xe, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 333.628387][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 333.628398][ T29] audit: type=1804 audit(1595941718.680:327): pid=16678 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/231/bus" dev="sda1" ino=15939 res=1 13:08:38 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x40) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r6) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000140)={0x7, 0x7, {r4}, {r6}, 0x4, 0x7fff}) process_vm_readv(r7, &(0x7f00000001c0)=[{&(0x7f0000001500)=""/56, 0x38}, {&(0x7f0000000200)=""/121, 0x79}, {&(0x7f00000018c0)=""/4083, 0xff3}], 0x3, &(0x7f0000002940)=[{&(0x7f0000001440)=""/166, 0xa6}, {&(0x7f0000001380)=""/152, 0x98}, {&(0x7f0000001540)=""/166, 0xa6}, {&(0x7f00000017c0)=""/253, 0xfd}, {&(0x7f0000001600)=""/218, 0xda}, {&(0x7f0000001700)=""/56, 0x38}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/211, 0xd3}, {&(0x7f00000028c0)=""/125, 0x7d}], 0x9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000100)={0x1, 0x302, 0x40, 0x7714, 0xffffffff, 0x3}) 13:08:38 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 333.796876][ T29] audit: type=1804 audit(1595941718.850:328): pid=16688 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/232/bus" dev="sda1" ino=16383 res=1 13:08:38 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000440)) r4 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:39 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 333.956306][ T29] audit: type=1804 audit(1595941719.010:329): pid=16696 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/233/bus" dev="sda1" ino=16384 res=1 13:08:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 334.038779][ T29] audit: type=1804 audit(1595941719.090:330): pid=16696 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/233/bus" dev="sda1" ino=16384 res=1 13:08:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:39 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:39 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRESOCT], 0x2, 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0x3, 0x4) 13:08:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x11, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 334.237414][ T29] audit: type=1804 audit(1595941719.290:331): pid=16712 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/234/bus" dev="sda1" ino=15780 res=1 [ 334.263489][T16714] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 334.392704][T16714] 8021q: adding VLAN 0 to HW filter on device bond82 [ 334.429028][ T29] audit: type=1804 audit(1595941719.480:332): pid=16712 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/234/bus" dev="sda1" ino=15780 res=1 13:08:39 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r2, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 13:08:39 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:39 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000100)={0x1ff, 0x1080}) [ 334.623784][ T29] audit: type=1804 audit(1595941719.680:333): pid=16766 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/235/bus" dev="sda1" ino=16380 res=1 [ 334.727645][ T29] audit: type=1804 audit(1595941719.780:334): pid=16766 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/235/bus" dev="sda1" ino=16380 res=1 13:08:39 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x12, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:39 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup3(r3, 0xffffffffffffffff, 0x0) socket$rds(0x15, 0x5, 0x0) bind$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711, @hyper}, 0x10) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='[\x00'}, 0x10) sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0xa, 0x0, 0x4}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0xc1) finit_module(r5, 0x0, 0x2) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) ioctl$KVM_PPC_ALLOCATE_HTAB(r4, 0xc004aea7, &(0x7f00000002c0)=0x8) sendmmsg$sock(r7, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) ioctl$F2FS_IOC_SET_PIN_FILE(r8, 0x4004f50d, &(0x7f0000000300)=0x1) ioctl$sock_rose_SIOCDELRT(r7, 0x890c, &(0x7f0000000240)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x8, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) 13:08:39 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0}, 0xffffffffffffff49) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 334.904833][T16780] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 334.947786][ T29] audit: type=1804 audit(1595941720.000:335): pid=16785 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/236/bus" dev="sda1" ino=16384 res=1 [ 334.969826][T16780] 8021q: adding VLAN 0 to HW filter on device bond83 13:08:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x25, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 335.059622][ T29] audit: type=1804 audit(1595941720.110:336): pid=16785 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/236/bus" dev="sda1" ino=16384 res=1 13:08:40 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2c, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:40 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r2, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 13:08:40 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control\x00', 0x4400, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x40, @ipv4={[], [], @multicast1}, 0x5}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0xfffffff8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}], 0x48) dup(0xffffffffffffffff) finit_module(r4, 0x0, 0x1) 13:08:40 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2d, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 335.552397][T16847] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 335.680691][T16847] 8021q: adding VLAN 0 to HW filter on device bond84 13:08:40 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:40 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$KVM_SET_GUEST_DEBUG(r5, 0x4048ae9b, &(0x7f0000000100)={0x20000, 0x0, [0x100000000, 0x0, 0x83, 0x42, 0x0, 0x2, 0x3]}) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x101040, 0x0) finit_module(r1, 0x0, 0x0) 13:08:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x35, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:41 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x5c, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:41 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 336.248140][T16920] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:41 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r2, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) [ 336.429335][T16920] 8021q: adding VLAN 0 to HW filter on device bond85 13:08:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x164, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:41 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1c6, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:42 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 336.998378][T16983] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 337.067963][T16983] 8021q: adding VLAN 0 to HW filter on device bond86 13:08:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:42 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, 0x0, 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x3fa, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:42 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, 0x0, 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x3fb, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 337.648021][T17049] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:42 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 337.789078][T17049] 8021q: adding VLAN 0 to HW filter on device bond87 13:08:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, 0x0, 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 13:08:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:43 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r2, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) 13:08:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:43 executing program 0: r0 = perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5280}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 338.356544][T17117] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 338.493333][T17117] 8021q: adding VLAN 0 to HW filter on device bond88 13:08:43 executing program 0: perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:44 executing program 0: perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:44 executing program 0: perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 339.087423][T17180] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:44 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r2, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) 13:08:44 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendmmsg$unix(r0, &(0x7f0000004b80)=[{&(0x7f00000002c0)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000240)}, {&(0x7f0000000340)="17768340c211d37d693b5aea9232cb5e206653b2e6eb0387827a5cef9a11781157941f657cd56d8192faebc22c73aad18a1ccb48e030c195d12890b37d0ded2844b40d0c47292937258b0f3b938c3a5c29d185b10be8c9445c37b8833a478d902238559af0405d195a4fa6324909c937fc85", 0x72}, {&(0x7f00000003c0)="38cc06cf5c559f72a02e34bd826596acd88365eba3d50142d6712a12cd4bdaf3b10b713b7d610610611c07bc0a3c2ccafc8a6f64a5640399f4db58309227", 0x3e}, {&(0x7f0000000400)="58dc759946f5e0631f01ce8f35f6be42b949a97e6556d315c44707c24cc6cdcd3d701873be49237e568f16c65f9a4530833fb3fb67495ab144d139e5d5934f9bf2f75a0455fca9d334b3c0da47f180d507e1a4f946c2eb97d2468ac14f82e2e404b899e201a1867a3c928b02002fcea51c935bb3c7b4a77d26a96e72896750798142b492408940126bdbd0f9774df9bf0ce866cb7299bcb6883e4054a90f", 0x9e}], 0x4, &(0x7f0000000900)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0, 0x20000805}, {&(0x7f0000000a00)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001e40)=[{&(0x7f0000000a80)="22fa00743593a4486b04037a2ae9504d9b26309336d36c763456c903e0683546aae5b91f8182ae6468cd5631b8426ef8e3c9e8654a008be7d31dcb742c474b240ed0dbb38f2a66aecbc1b88ab8085a84cab337e23dfe1ff0b78ce1709af6f76ee806454a30020c67d4829bdeafbe3528b0b8e1146f431b3a0a175032ea9d68d709ca5c4b3363e6da6c46156271632e0a64966cfa5c4307d552", 0x99}, {&(0x7f0000000b40)="e35605feadda508994e166807d3834a9a24a1debcc608c5b3fee312929f1bf96c0afcdfce28af77317086d6601ac247168ef1d8d4e1dfaf120c5511f075cf1da2e26b4b334be4905a0e07f47044b8272c904c258778d099d2c51266e4389810247f844e1ec857fec01cdeb6e9f62e54923039ed5c88c97258c2a400e7de599b9465b58bc94aadf55cbab4d0a7c8216bad015cff34be24e6e9e1c7653596387ecab", 0xa1}, {&(0x7f0000000c00)="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", 0x1000}, {&(0x7f0000001c00)="878f177d3d1130f4c2da4ddfd02962d231a0bb4ac5fc5f6750aaab16b4455bf970f07410da7ba6a73849b5bb96ef24c7e7b1847c216dcc1a6ca9cb132c99f222563f6d49da20a49f085a947fc2329280ee167c7a3f54681486b12e54e744a8d11619c4d7da777a34eadb0fa193c62b59f7bb51c826f226ab1285c62a92449fd2e22a1b8c60074c4d187ed0af89a4549c70237de698982ca2ef700f07fac860e29a0723f7a7d75d2a32df16ff9ddb9eb27c7884c64c18c4df4e6303326cca8aa5e2738ba2b27d0ae87be1f56fb959e84cb2a294457aa31a1bace898", 0xdb}, {&(0x7f0000001d00)="2a7b2d58958ce99d482f8c29", 0xc}, {&(0x7f0000001d40)="2586c2fdc9fe6a9a0dab42c3a3c2ae4269b610617850865a971e47f7517ee2707eff50179ec7e8eeb37d5f3506dc2385151a8b10bdb81d5c9a41ff6b4aeffb1357282630bce639c523fc62bb7a01b4da635f2a42333ea9a15958ded6b34a6e4fa229bd53186ea47aca18702eb1a70953052b7297f329d97eb7256be943081cd0f649d0ad35d8693e4c6f74601aab2540f6e338281e16f233d7653e1174f53fb071d7386852f94a3d51efec10bcc4ff0fba7aeb305959402fdab96dc85d0681ef80c1e9d57f63a2ab8a93e7765cc84134dac3742662", 0xd5}], 0x6, &(0x7f00000022c0)=[@rights={{0x24, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, r1, r1, r0, 0xffffffffffffffff, r1, r1, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8, 0x4000}, {&(0x7f0000002380)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000002480)=[{&(0x7f0000002400)="35347255601c5c0b12333125601a83ee8c69fdbe76feb0431c165bf757d6337a09328b3ce5b75da53fa23a031e3448121481705f39ceae5fd62f73fc6636b9987ab3aa72a4ed625fc08fdf6e8c8aa3b079c8fff4a366d99fd8f105b43372fe0460a39707363f4c0f", 0x68}], 0x1, &(0x7f0000002780)=[@rights={{0x30, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe0, 0x20004004}, {&(0x7f0000002880)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000002a00)=[{&(0x7f0000002900)="a9d038e5d18cb50290e9b062928fe0436ab6a765ddc79c1d1f0355418b7974579b0da0798572dbe1374f826bc7965372e95aca6e0e8e937d30dd0649fe089c79c1312d68f67e3ad5490942d1f055bb7b89f707c22bb6c315fc9b849be72db818e7582ab9db469d9234784717a7a0b873e61137bad938e37c672a8b2236e1ea1a64869bd574c07e81e2835062eb2b28f45d946094fd696c116b36c48e83ff445745c10a97efb4135c93e96f493415815cb986d9780cd875a75b4726ac3484cf6e8a414cc63ea3cb86d319027ff7dc38e73af50f0265412e8f47ddf4a95da3d7709ad2", 0xe2}], 0x1, &(0x7f0000002b80)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0, 0x4018001}, {&(0x7f0000002c40)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000003300)=[{&(0x7f0000002cc0)="b875f4d16b7e36e00d2203825d4b64863e71f1cd7b4cd6d4f3622ea7d14ff05bb5b5db5f2a06803ffcdc7514f4133034b75da982f54faf8858ea88828cd5adff49e4e24d92c0622f4ce66d0a9956d2c865b7735cb18284b122e4defeb42fcf03bdc0b4b4a82fb3395ba8f1fc15db207a255319e5c13e1a2a39c6", 0x7a}, {&(0x7f0000002d40)="7538969fe0a7c6be76e19f4e968b74125adc9ef20448de872850195b18fc583aabe4b41197b2d218917b0bf3ea2a6a7adce22581193022adade3aecc84cb30ef65749ea59073b88d7b8d92be30ea42ad20380ba79b475da3042285a4c5f4d797e58884d61c4c2004268808e0670bf82c9afcf3f154e9635bbfdd22e65d9c7e633c00706e98b6d52117666ee9", 0x8c}, {&(0x7f0000002e00)="ed2e230dd9c886c0ea6347ccd1ffd054221d527fb8f1c74483ccb72c6de21b01717de7ef6c8ed799abd7f1cefc45dbfc493d116b42c3d3d2427bc5cd29febbf61a177ff0cb71083fb0db5bcf97483338edb1d2e399f8d05e4481bcd22651d5309321696d898f911f179de572691783d21af402238428222bf01883", 0x7b}, {&(0x7f0000002e80)="5a22210c4b5a57a7be129648bb0836b7d1a68462ad9b274eca08cf7ba310d9482c51bdea12d5c85a72001a06ade781145e4d9ea00839d0c991493d53cbd9ef86693289fb131e97a345e73cce7f447dff020aba6e5ab113816ee51194ebb0ff422a8f09468b985547eca97676b3b15063792a7cf3fdab4b712b6aea187084c1313141ef60fd8a59e33abd50da9e4e552e46be8a9b9b43993f8c28c436ceefc6454dfe1b486bcd7a89cbc7943fa4fa7222ad77ce36ede2409f392e7b435b5e01b298c0351b936cbf24c2cf8fcffacf79841c2fb834913766c04274bee6bc68f19aca9184523710558ac54baa1b56af3455f9a680847d1f", 0xf6}, {&(0x7f0000002f80)="bc2597dde14ede2c77e64a28ba802eaa187aa0a0db3d3b79e7f8cf0c943f39f551d2f87708efa4c26bfd562a12529aaa7b8b532dc5f4b846e0818deecf957c0f1a2fce40099072107428be1b2e8de9ae5387587e049f3900f6a7c292b2fe3e69045e1e6dceda09741564970d4db55b5ff50e61ae47c9fb9b643bedfb9c2f081a043bf281a69c7bcef3075e187ec57c94d918cec63c088c6120a763fea21bcd9bc839dd6c5c7e3f71f4dec2a642dee09d2f2de6bb73b4bb1de5e3a4cd41eac6aad0ee1c4784617e1bd912ca2adf362a0394ed596641bb9d31fcfd368b010475fae4e7f63de45dfa000a5edb426b00ec", 0xef}, {&(0x7f0000003080)="05b38d68c2eeedaed6d2ef021ccf49186148c39250566a236773eaadfafe9a941766da2729db76b5f7b66b7e5301ec93406dcadaf93294fe78bfd8064779a62d2ec70f5023ddaf1ccf3ac40b23f9effd47255316c9e8d902ebfb775f279b26b81440a92114452b682be2a056b0159f6b0bac30fbfa5c2203f21cea59bd51004d1927a486acb0f8771132349b80642e71b172888ff54d594f4ec3c3f7a108350be8da02bafac86c940f98e94856c6d12ce4a7b6c372beeb1cba81964560b5d896b922ea5c80492c623974bac44dc6afc41897bab6df4b26", 0xd7}, {&(0x7f0000003180)="2389d76f2047a1cd98e8dba997cd0f7676516295eeac5edd2773ecdf205cfac0e5e53e334bbe85449213a4b88ba5f91fdbab8c154563a5f479d3b6c0", 0x3c}, {&(0x7f00000031c0)="a44c79cee36388bd5cbae63fc725a0114ab389e7297adef07567", 0x1a}, {&(0x7f0000003200)="109248647590402390bb8e0fe74ef728ebc890af259848bc378ce997b9a91bb4610254e08f4fd16ea30a53f75aa90f6f685e7f0a1edd4fe3c1be95f68e884d8c2c7591e562ce00c8903f0ce7e96c75e255f20f875c234f0f23f8c52116494818ad4fa22485cf46fbef829e766640d6d5cfe63e1e584006bc37044bf16a75cb6ff12bb03d25d2f6a94d2aabe947f0c46865adae6c80d5af6413f70387fcf4d096aec36f8629152342d511736060b651448614270a6c2ba4dbaa12c8476913b6cfb0f6e58e3bf3e53badbc739be6b3d50d87845a9ddbb381076c292be2c3d18499974d4c3cfebc49bc422c", 0xea}], 0x9, &(0x7f00000033c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x78, 0x20008085}, {&(0x7f0000003440)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000003680)=[{&(0x7f00000034c0)}, {&(0x7f0000003500)="ff5784c39eca45a1903480c67f7338a202926b677f9902bc990ccf586c56fd3427de568a1912e2f2d6bb1d867ebc4a9c98580de1fa07f9e78db0fa3be8999b3f5d8120a23f2731c16b603cc158bc087c1f4ce9150deb92ee978259df2927715cec271910e3e3524ed6d98a4d4feae4774773dc0a33b8ab87e12990ff5c765a4a8493cfa7b45489e25a7d97c54be83bd817604d02cc3b4515aa52a58c2583964b1cf5a2b98f3477496c27e67394cd06cec508f61b2d6cbfdc6da7598a537ef6a666879f70f9f7abcb35533420d1", 0xcd}, {&(0x7f0000003600)="068178477f941314380181b240a9f88a8ec80b661149c8dd6f35fdd08b84342147f2a1c31c5ebd924c38a0e79d2ff74b326706dc5661fd3350cca0dad8e1e5979ae308b47a5b2ff38d1a5161cabf80", 0x4f}], 0x3, &(0x7f0000003840)=[@rights={{0x1c, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xf0, 0x40480c0}, {&(0x7f0000003940)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000004a40)=[{&(0x7f00000039c0)="d75ba8b43c507e4579c4f911e683bb591fb07e691223b3e0c95b8d11a4ffed706ffa66ad08360ca2a3bc928262741b3ee8830074128230", 0x37}, {&(0x7f0000003a00)="842ac6f46dc5632d38538cc5b6dcb6065d6faa33427688e722194d7efa12926d03d94d2f13e32dc6958f9a4521eef92939e26195a72dac781b", 0x39}, {&(0x7f0000003a40)="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", 0x1000}], 0x3, &(0x7f0000004ac0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0]}}], 0x98, 0x4000}], 0x7, 0x4000) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000004, 0x102010, r0, 0x2d605000) rseq(&(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x29bfc57d}, 0x7}, 0x20, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000200)={0x8}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) sendmmsg$sock(r7, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) [ 339.276098][T17180] 8021q: adding VLAN 0 to HW filter on device bond89 [ 339.376134][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 339.376144][ T29] audit: type=1804 audit(1595941724.430:341): pid=17230 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/239/bus" dev="sda1" ino=16375 res=1 13:08:44 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./bus\x00', 0x6, 0x2) [ 339.485629][ T29] audit: type=1804 audit(1595941724.460:342): pid=17230 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/239/bus" dev="sda1" ino=16375 res=1 [ 339.588047][ T29] audit: type=1804 audit(1595941724.580:343): pid=17234 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/240/bus" dev="sda1" ino=16380 res=1 13:08:44 executing program 0: perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 339.681753][ T29] audit: type=1804 audit(1595941724.690:344): pid=17234 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/240/bus" dev="sda1" ino=16380 res=1 13:08:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) 13:08:44 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="e4b6", @ANYRESOCT], 0x2, 0x0) r4 = syz_open_dev$hiddev(&(0x7f0000000100)='/dev/usb/hiddev#\x00', 0x8d, 0x40000) dup3(r1, r4, 0x0) openat$smackfs_cipsonum(0xffffffffffffff9c, &(0x7f0000000140)='/sys/fs/smackfs/doi\x00', 0x2, 0x0) finit_module(r1, 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={r5}) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r6, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000000ff9200027bd7000ffdbdf250800030004000000"], 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0x20008080) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f00000001c0)={'macvlan1\x00', {0x2, 0x4e24, @empty}}) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = dup(r7) sendmmsg$sock(r8, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000440)="d5", 0x1}], 0x1}}], 0x1, 0x40800) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r8, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, 0x140f, 0x2, 0x70bd29, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x7, 0x45, 'cm\x00'}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}]}, 0x28}}, 0x41) 13:08:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 339.811131][T17247] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:44 executing program 0: perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 339.881590][ T29] audit: type=1804 audit(1595941724.930:345): pid=17252 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/241/bus" dev="sda1" ino=16066 res=1 [ 339.930143][T17247] 8021q: adding VLAN 0 to HW filter on device bond90 13:08:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 339.978964][ T29] audit: type=1804 audit(1595941725.020:346): pid=17252 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/241/bus" dev="sda1" ino=16066 res=1 13:08:45 executing program 0: perf_event_open(&(0x7f0000000800)={0x3, 0x70, 0x2, 0xf8, 0xff, 0x40, 0x0, 0x0, 0x91dd7106ca8fd72f, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x3fffffff, 0x2, @perf_config_ext={0x100, 0xdf3}, 0x200, 0x8, 0x40, 0x5, 0x2189dbe8, 0x0, 0x6d46}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 340.050239][T17296] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r2, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) [ 340.093152][T17296] 8021q: adding VLAN 0 to HW filter on device bond91 13:08:45 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e702951c72f35e5afd0000000042ee91464b27ced2f3fe0056"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:45 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x3, 0x101000) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000000140)) r4 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8a85006d7a325938dfc43c63bf650657752ce94b47bec159127e4da4042b43665027629f5fc99e29219164a589ab4ee7cbcc5a901cee720b"], 0x4c}}, 0x0) [ 340.288952][ T29] audit: type=1804 audit(1595941725.340:347): pid=17344 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/242/bus" dev="sda1" ino=16381 res=1 13:08:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xd00, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:45 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 340.390989][ T29] audit: type=1804 audit(1595941725.370:348): pid=17344 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/242/bus" dev="sda1" ino=16381 res=1 13:08:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:45 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) truncate(&(0x7f0000000140)='./bus\x00', 0x3f) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_GET_ONE_REG(r5, 0x4010aeab, &(0x7f0000000100)={0x7c9, 0x3}) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) 13:08:45 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:45 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 340.568259][ T29] audit: type=1804 audit(1595941725.620:349): pid=17360 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/243/bus" dev="sda1" ino=16381 res=1 13:08:45 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="040bcf804aa7ef5edad257cc7f8cdee1af85c8dde16589027887e89ea631027854661bc412c2f7c5076fc30cd12ec982b86ad2a7fd55919ef59849c2133bcdbd7bd906d459f8555fe87985d3f78983c65ef95888373f697307ac96dfaeff800133a07146752932094defd7e2d8b827f8cafcf4e289436bbe99368124a372a4e2c5fafe71955ab4ec504692b7601d5d", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 340.631689][ T29] audit: type=1804 audit(1595941725.620:350): pid=17364 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/243/bus" dev="sda1" ino=16381 res=1 [ 340.917638][T17377] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 340.992729][T17377] 8021q: adding VLAN 0 to HW filter on device bond92 13:08:46 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 13:08:46 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:46 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) sendmmsg$sock(r2, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r3 = openat$cgroup_ro(r2, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r3, 0x40046411, &(0x7f0000000140)=0x3) io_uring_register$IORING_REGISTER_PROBE(r3, 0x8, &(0x7f00000001c0)=ANY=[@ANYBLOB="000200000000000000000000000000000000090000000000"], 0x1) r4 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r4, r0, 0x0) finit_module(r4, 0x0, 0x0) 13:08:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1100, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, 0x0, 0x0) [ 341.210985][T17421] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 341.296529][T17421] 8021q: adding VLAN 0 to HW filter on device bond93 13:08:46 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1200, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, 0x0, 0x0) 13:08:46 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x1, r1}) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mount$overlay(0x0, &(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x3000000, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}], [{@appraise_type='appraise_type=imasig'}, {@fsname={'fsname'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r2, r0, 0x0) finit_module(r2, 0x0, 0x0) 13:08:46 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 341.534234][T17475] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:46 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup3(r4, r3, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000000), 0x200a00}]) io_getevents(r5, 0x6, 0x3, &(0x7f00000001c0)=[{}, {}, {}], 0x0) r6 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x48000, 0x0) dup2(r7, 0xffffffffffffffff) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 341.712341][T17475] 8021q: adding VLAN 0 to HW filter on device bond94 13:08:47 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 13:08:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:47 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, 0x0, 0x0) 13:08:47 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x400001, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r4, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000780)={&(0x7f0000000280)={0x4e4, r5, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}, @NL80211_ATTR_IE_PROBE_RESP={0x4c5, 0x7f, "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"}]}, 0x4e4}, 0x1, 0x0, 0x0, 0x20000000}, 0x40040) dup3(r1, r0, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000100)={{0x1000}, 0x10}, 0x10) finit_module(r1, 0x0, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000140)) [ 342.139354][T17534] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 342.248873][T17534] 8021q: adding VLAN 0 to HW filter on device bond95 13:08:47 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x24) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:47 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 13:08:47 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x160, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x130, 0x160, 0x8, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) renameat(r3, &(0x7f0000000100)='./bus\x00', r5, &(0x7f0000000140)='./bus\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 342.405695][T17589] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 342.518899][T17589] 8021q: adding VLAN 0 to HW filter on device bond96 13:08:47 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2500, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 342.601239][T17634] xt_CT: You must specify a L4 protocol and not use inversions on it 13:08:48 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 13:08:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 13:08:48 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000100)=0x22, 0x4) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2c00, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:48 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae34c24049c44e7"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 343.044443][T17651] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 343.118206][T17651] 8021q: adding VLAN 0 to HW filter on device bond97 13:08:48 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ad"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2d00, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:48 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmmsg$sock(r5, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$PPPIOCCONNECT(r5, 0x4004743a, &(0x7f0000000100)=0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04c5393e67815dc2d1f1ef0cee0786af", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 13:08:48 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ad"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 343.369451][T17704] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x3500, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) [ 343.450701][T17704] 8021q: adding VLAN 0 to HW filter on device bond98 13:08:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:48 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 13:08:48 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x111) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:48 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ad"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4c}}, 0x0) 13:08:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:48 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) sendmmsg$sock(r4, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) sendmmsg$sock(r6, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="d5", 0x1}], 0x1}}], 0x1, 0x40800) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f0000000040)={0x1, 0x0, 0x1, 0x6}) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x40) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r8, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000001c0)={0x990000, 0x8, 0x8d, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x990967, 0x7ff, [], @string=&(0x7f0000000140)=0x8}}) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0xff, 0x6, 0x8, 0xff, 0x0, 0x2, 0x80800, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x5, @perf_config_ext={0x100000000, 0x2}, 0x80, 0x1000, 0x8, 0x9, 0x4, 0x893, 0x7fff}, r8, 0x5, r9, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000080)={0x0, r7}) [ 343.983833][T17769] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 13:08:49 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+'}, 0x16, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0x2) 13:08:49 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec6"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 344.144036][T17769] 8021q: adding VLAN 0 to HW filter on device bond99 13:08:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x5c00, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:49 executing program 2: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000240)=ANY=[], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, &(0x7f00000006c0)={0x14, &(0x7f0000000080)={0x0, 0x0, 0x55, {0xfcf8, 0x0, "0b4ff1b2b0c0c90a6f4bb6c931d9baf421147d137bdeed3515b4e185351b508df7af6d4528162351bec21b1d742e5ec82f45e57231216894778c30ad59519239f4a6805ea50f6023fc161ba024370803d23c1f"}}, 0x0}, 0x0) syz_usb_ep_write(r0, 0x8, 0xd5, &(0x7f0000000040)="4a6a100a19125835382d7c6545fc69b7e4e1b04bf3ca7f42383f89495bc8c523e60c13bab9f964a8857c1bec2b62bc777e41b57585b823c57d0260800a86e07209a311e43f7330fea031df96eceff7f37a7588792a0622adc69bce4006ec5257091e1c02b07e5f606d148aaf1fe77e702d45d49709191a0956248a4c07d7f92a7f6411954e23cd0132e3e334506be61891327a9d14062b5bafe4792175662100d2dec584446bc0e300ce433da18f0a3918993629c98c2b4cb02a387924e2e47f68b196e105ccccb01dcfe8400b42e947fc0aad7476") r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADDIR(r1, &(0x7f0000000100)=ANY=[], 0x2) 13:08:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4c}}, 0x0) 13:08:49 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec6"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 344.299997][T17830] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 344.352369][T17830] 8021q: adding VLAN 0 to HW filter on device bond100 [ 344.563000][ T2674] usb 3-1: new high-speed USB device number 4 using dummy_hcd 13:08:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000300)="32db96df", 0x4) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a49f6e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce85f163ee340b7679501013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100ef030000000049740000000000365592548e5ecc326d3a09ffc2c65400000000000000000000000001"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b843100a6"], 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 13:08:49 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x48c03, 0xf8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$afs(&(0x7f0000000100)='afs\x00', &(0x7f0000000140)='./bus\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="fb", 0x1, 0x4}], 0x11000, &(0x7f0000000240)={[{@flock_openafs='flock=openafs'}], [{@fsuuid={'fsuuid', 0x3d, {[0x37, 0x6a, 0x34, 0x63, 0x31, 0x39, 0x38, 0x66], 0x2d, [0x30, 0x63, 0x38, 0x39], 0x2d, [0x63, 0x52, 0x33, 0x37], 0x2d, [0x31, 0x38, 0x37, 0x33], 0x2d, [0x35, 0x34, 0x30, 0x34, 0x65, 0x37, 0x57, 0x37]}}}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="040b", @ANYRESOCT], 0x2, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 13:08:49 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec6"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 13:08:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x6401, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4c}}, 0x0) [ 344.882861][ T2674] usb 3-1: device descriptor read/64, error 18 [ 344.909732][T17886] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 344.929403][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 344.929412][ T29] audit: type=1804 audit(1595941729.980:372): pid=17888 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir391527588/syzkaller.2W9qRa/254/bus" dev="sda1" ino=16382 res=1 [ 344.961424][T17886] 8021q: adding VLAN 0 to HW filter on device bond101 13:08:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x4c}}, 0x0) 13:08:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xc601, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2c, 0x30]}}}}]}) 13:08:50 executing program 0: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="adad41f9872180a38fae24eec621a3fb542ae3"]) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 345.041444][T17931] ------------[ cut here ]------------ [ 345.049655][T17931] WARNING: CPU: 0 PID: 17931 at fs/read_write.c:427 __kernel_read+0x8d3/0xa40 [ 345.060539][T17931] Kernel panic - not syncing: panic_on_warn set ... [ 345.067146][T17931] CPU: 0 PID: 17931 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 345.075805][T17931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.085854][T17931] Call Trace: [ 345.089144][T17931] dump_stack+0x1f0/0x31e [ 345.093478][T17931] panic+0x264/0x7a0 [ 345.097375][T17931] ? __warn+0x102/0x250 [ 345.101531][T17931] ? __kernel_read+0x8d3/0xa40 [ 345.106294][T17931] ? __kernel_read+0x8d3/0xa40 [ 345.111065][T17931] __warn+0x227/0x250 [ 345.115059][T17931] ? __kernel_read+0x8d3/0xa40 [ 345.119824][T17931] report_bug+0x1b1/0x2e0 [ 345.124164][T17931] handle_bug+0x42/0x80 [ 345.128339][T17931] exc_invalid_op+0x16/0x40 [ 345.129327][T17940] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 345.132844][T17931] asm_exc_invalid_op+0x12/0x20 [ 345.132864][T17931] RIP: 0010:__kernel_read+0x8d3/0xa40 [ 345.132877][T17931] Code: 48 c1 e8 03 80 3c 28 00 74 08 4c 89 ef e8 65 f0 f6 ff 49 89 5d 00 e9 f0 f8 ff ff e8 e7 e0 b7 ff e9 e6 f8 ff ff e8 dd e0 b7 ff <0f> 0b 49 c7 c6 ea ff ff ff e9 6e fc ff ff 89 e9 80 e1 07 80 c1 03 [ 345.132883][T17931] RSP: 0018:ffffc90004397cb0 EFLAGS: 00010283 [ 345.132893][T17931] RAX: ffffffff81bcb163 RBX: 0000000000000000 RCX: 0000000000040000 [ 345.132900][T17931] RDX: ffffc9000474a000 RSI: 000000000000013d RDI: 000000000000013e [ 345.132908][T17931] RBP: 000000000808801c R08: ffffffff81bca93e R09: ffffc90004397d18 [ 345.132915][T17931] R10: fffff52000872fa7 R11: 0000000000000000 R12: 1ffff11011f71b2a [ 345.132922][T17931] R13: ffffc90001183000 R14: 0000000000000001 R15: ffff88808fb8c400 [ 345.132940][T17931] ? __kernel_read+0xae/0xa40 [ 345.221331][T17931] ? __kernel_read+0x8d3/0xa40 [ 345.226113][T17931] kernel_read_file+0x352/0x5c0 [ 345.230967][T17931] kernel_read_file_from_fd+0x57/0xa0 [ 345.236341][T17931] __x64_sys_finit_module+0xe9/0x1a0 [ 345.241645][T17931] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 345.247707][T17931] do_syscall_64+0x73/0xe0 [ 345.252119][T17931] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 345.258005][T17931] RIP: 0033:0x45c369 [ 345.261898][T17931] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.281528][T17931] RSP: 002b:00007f92285c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 345.289951][T17931] RAX: ffffffffffffffda RBX: 0000000000003500 RCX: 000000000045c369 [ 345.297928][T17931] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 345.305903][T17931] RBP: 000000000078bfe0 R08: 0000000000000000 R09: 0000000000000000 [ 345.313875][T17931] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bfac [ 345.321848][T17931] R13: 00007ffe92ceca5f R14: 00007f92285c49c0 R15: 000000000078bfac [ 345.330991][T17931] Kernel Offset: disabled [ 345.335380][T17931] Rebooting in 86400 seconds..