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", 0x1000, 0x3, &(0x7f0000000100)={0x0, 0x989680}) 14:41:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xe}, 0x0) [ 2148.169105][ T5055] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000012000000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="4400e5f0cf3f4c01f8930fac780000", @ANYRES16=r1, @ANYBLOB="170900000000000000000100000005000700000000000800090000000000060002000100000008000a000000000008001800ffffffff08001900ac141400"], 0x44}}, 0x0) 14:41:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) mq_notify(r0, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 2148.389467][ T5061] device vlan811 entered promiscuous mode [ 2148.409021][ T5064] device veth1659 entered promiscuous mode 14:41:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000013000000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:43 executing program 0: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x842, 0x0, 0x0) mq_timedsend(r0, &(0x7f00000003c0)="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", 0xfd1, 0x0, 0x0) 14:41:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xf}, 0x0) 14:41:43 executing program 4: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002e40)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000000c80), 0x400000000000345, 0x0) 14:41:43 executing program 1: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="67d00789f48d3611520758816af79c7d6206a2cda05be9aa89e0753096dc015ca8ea507772e09b50f58d3a8f43dee09bfebab40000000000000000b691be32a3dacd642281ea1a2f594abaefd9672e5f8d117c332d71000b12dd6d5db169acbbfc68bebf4aef7c1fe609a819d1bff47d9d2ec5dfbff9723e85121b1ac6efb2ff1e9542629aa7d7ec0600e503ca0f00000010537688e05dbb059049e71a4f8258c670bed5c50e74847794e7affe95ee6cbaedae709eca304cb1c8c0ef8a32a8ee3c3cdf314a870070e1c831e9935eb07033ce5f19c2dd47690ce0846a1fad75782c9a512bf01489a378bdb1a45b83157bdc9f260f449432d3", @ANYRES16=r0, @ANYRES32=r0], 0x44}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x208500, 0x0) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000005, 0x8010, r2, 0x180000000) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NL80211_CMD_NEW_MPATH(r3, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x804104a8}, 0xc, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x80}, 0x40000) 14:41:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000060000000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000006c0)=@newtfilter={0x50, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x4}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x20, 0x2, [@TCA_CGROUP_ACT={0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0xffffffffffffff97}}}]}]}}]}, 0x50}}, 0x4008010) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@newtfilter={0x44, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0xe6c}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x14, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}]}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@newtfilter={0x44, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0xfff2}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x14, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}]}}]}, 0x44}}, 0x0) 14:41:44 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x804, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @dev, @void, {@ipv4={0x804, @tipc={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr, @empty}, @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}, 0x0) 14:41:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=@filter={'filter\x00', 0xe, 0x4, 0x3cc, 0x1d8, 0x110, 0x23c, 0x110, 0x1d8, 0x2d4, 0x304, 0x304, 0x304, 0x2d4, 0x4, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00', [], [], '\x00', 'ip6tnl0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@unspec=@mark={{0x2c, 'mark\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@mcast1, @remote, [], [], 'virt_wifi0\x00', 'nr0\x00'}, 0x0, 0x108, 0x12c, 0x0, {}, [@common=@inet=@iprange={{0x64, 'iprange\x00'}, {@ipv4=@local, @ipv4=@remote, @ipv6=@private0, @ipv4=@multicast1}}]}, @common=@unspec=@NFQUEUE0={0x24, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa4, 0xc8}, @REJECT={0x24, 'REJECT\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0xfffffffffffffd9c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @private0}, 0x1c) 14:41:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000f0000000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2148.918401][ T5099] device vlan812 entered promiscuous mode [ 2148.950775][ T5105] device veth1661 entered promiscuous mode 14:41:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x0) 14:41:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x4}]}, 0x2c}}, 0x0) 14:41:44 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x80082, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val, @void, @eth={@random="e6c489315c19", @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "fe0824", 0x14, 0x6, 0x0, @loopback, @empty, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}}, 0x4e) sendmmsg(0xffffffffffffffff, &(0x7f0000007b00)=[{{&(0x7f0000000280)=@nl=@kern={0x10, 0x0, 0x0, 0x200}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000300)="8c97220b19a14d5ba52b6d758f3e92760cc20e8af65cf5e00d9062d6429794c402f3fcdd50f14064aa77de44227202bff52a49c48cb2e201032e43ddda3ff69a84defc1503930cf63d0d6e9af6f7fc4bb5d748c78101f9a6c2766eed300f527c26c82d44e2b5bda898a32e4a104ed7b1c5783c3d57d5e389eb3efd2e1906bf", 0x7f}, {&(0x7f0000000400)="17", 0x1}], 0x2}}, {{&(0x7f0000001840)=@isdn={0x22, 0x3, 0x3, 0x7, 0x1f}, 0x80, &(0x7f0000001a40)=[{0x0}], 0x1}}, {{&(0x7f0000001a80)=@generic={0x26, "2318773c8402aa94d80760df3891e74250500882b7e0a08fe48b83eadb8ee7f080de3b535d8781d78fad672f36a4faf9b52f02b9a21e80160d9a712d4c98436d1e479028ac1b9d1586318a25d91f5c15f8ab3a4ef7a2bf890f4d5443b8cdecc5553f2b57ebe3a87853e8ec72f8cf5a049706c00b76cf6c14b4941a2d36c6"}, 0x80, 0x0, 0x0, &(0x7f0000001b40)=ANY=[@ANYBLOB="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"], 0x1310}}, {{&(0x7f0000002e80)=@sco, 0x80, &(0x7f0000003280)=[{&(0x7f0000002f00)="0e3bbb601b85", 0x6}, {&(0x7f0000002f40)="b345230c3b1df6ac0fdc01671d9e4686a49eea160c9988b74a64ec827f9d48322d69f4fbf24ccd51a620d1817897", 0x2e}, {&(0x7f0000002f80)="ddae23bee3f8af614edb254424626f9cad644749654eaa4ae33fa0f2ffe2bf3691065c6a9f16c80901d71e05fe3206c63cdafc11e3109e4963c19e9ebcb3ab9f916f2c0b6ebe9f03a8d0", 0x4a}, {&(0x7f0000003140)="4a51f429c96bad6ab41259e94aa6904fbefd423518bb07693e41ca102b060841d290eac8bf9fe7a3b6f8c03ca42d67fd6413e5e959bc6fd64bc49aa7b6c757dfdbaaa53ed3575619f33f7a139093bd7cfc56e62f39d786a61c43cc7f30dd09fccdb00c898d5e721218f29783008a2b7daa710c4d10b536c237b0800129c60795dc42f4c81b7ce204b3cdb0f2b4749fc203425f36e02f6f304a6c07257c064e5b29c38c6473cedf8f9d3bc67ca347b9509c56289bcf5d85d3a0f429676f5b9aaa816216ed8185b964c669d23fb1d3535124fc3d25f211a5eb4d56cc4f1dd26d0a843c7a", 0xe3}, {&(0x7f0000003240)="895a51ccf0a3af38a688f9cd1fc0d73fabcf586c03e9877a12d337939af6fcee405f859b", 0x24}], 0x5, 0x0, 0x248}}, {{0x0, 0x0, &(0x7f0000005740)=[{&(0x7f0000003680)="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", 0xdbe}, {&(0x7f0000004680)="36743acf6e0eaf2c64d2bcaec1dd544e1b1e13f24166fd576c3165af62bfdcf5589a4205f12dc31fcef501e92b742ad0d5888e7eabee6065cc89dc2874879e3848da628e545c310adb14bd7d4fb59cceb62ea8b134abd1c399d1f67b7571949a6c7dc41c477e640b40db96d454db4039d95678", 0x73}, {&(0x7f0000004740)="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", 0xa3e}], 0x3, &(0x7f0000005780)=[{0x108, 0x0, 0xc1, "63d55070c207a9979a8b5ee033a66a99cb7bd294dbb9cd931c208fe53abfc68e05c167fd0458566d25c0a7ecd0d10ccb9aad604b4fc74bddb1ffc4b8206720958aaaaa8980c4fe48bc3ed3a118fdf776bcb1ac27385c3dc593e8a22050291c76da46d7ef4be380c4fc5de2457747f716ff118a8287fa739c6173633b6152a3d79e7ae8dfe5a8a7672f7501aeb4df29de035a95d0622dddc4e4872561848235439ee0e4ad0041484fe7208d54bf28ce87aa0d39a2b7b46e8eda4f5b694c074144358a10913dc77464f630f71777e5340b4b5b8a9a0845166a9ba0057ec59dfeb27a7ac64b9b19dc8953dda120474710514789ee76dff6"}, {0xd0, 0x111, 0x8, "9ea175681fc8cbf8887454381f0bd1831878a0e03db93886ee892edfc19ceebafbc62eeb0ff41e3e37ebea1bdc69da20316e8431cee931b8d6c74a6afd2347c2afeed1e03c6116b199227d5156c1035ddd7f9dafaab6cf962d2c7ee4d67c96f5a2f3f34535d7a271415da7f2efc45602610a5bd0251ebee9d526222dba31c5eae6f5263462e62bb4b72f6fa77ed82cdb24535f1bb39d672e60da964357dbf750028049fe82d17b3f8c1916ea40755467a94cb3c83f953bb636a579"}, {0x18, 0x105, 0x0, "e0"}, {0x28, 0x10f, 0x80000000, "18eaf1dfb503ab0cfa9817238c9341ecca43e5e5"}, {0xe0, 0x0, 0x0, "5c2ad68812486390342c0e3a41031e76f6f0b75ba60ebc1d611f5ce5fdd3d4b9ced433f129a82122d4f4a45cadff4c48dd7f8b923c22187fb03ac430bcfbfdb14b906acc8178003fa7c5bf2a1862f15bb18fa02e6785b669d9860caf3854536a98d6b88e78fdf29bfddce22d4b3bb0d1dfd30e2d19f0db3bf3516bcd4e79fb11289f6197c31d41a3ab7cec1e4b8cd684ca48fad649593462abf4e610164688ac4e69277dd7115f5dff30cd3e5112fc4a35227e8796ae48134fec18522bd744f4a6f5f4dd5afd31d86bcf21292a6a5f4e"}], 0x2f8}}, {{0x0, 0x0, &(0x7f0000006180)=[{0x0}, {0x0}, {&(0x7f0000005cc0)="416979deaa4e54ab712a446a20043930e2a92aa9c22c", 0x16}, {0x0}, {&(0x7f0000005fc0)}, {&(0x7f0000006040)="fcaa20e3e63ce32984b3adaff3753a177d36fff445b48fce7907eac6fb3d2771a09b7c5e500742f26fb51274503e1e2465907476cf1c6d2db113af15d07ea9ba034c69291d9fdbaae95791b5f9b071141303772cd228c9e5521de5d6b5c921afa1009c7d691cd27de4b28c29fb75e7256f5b27456e1bd5bf838f862c0378179f7909a47a8b870f44a8f6101376de51cdb7261e7c21071e9929118ad3d17e7cc4df42ae2c017bef1bb3", 0xa9}, {&(0x7f0000006100)="2c8bd289b6cf4627481680ab62f85290176fb97ec9e56bbb393819af56b49dea6447ed445a92278d41ee6a2b5e300dc79332e6cc8bf6a14b7161b5fc83fff57a42ac22f2b33ecc253f92aca093141b4a6e8dee4480eea4ff258fa4552a552955d58bb1b2bc666226ea9a3d921235bba42a3d6292433abe8f9a12e0a0eeac407d", 0x80}], 0x7, &(0x7f0000006240)=[{0x50, 0x0, 0xffff0001, "1faa1e556de0c3265d15a3684334cf1b3e235842e5fd3fc0a931fe56966455dfe5654056c6a0c4bf279725dee213db5b24a301d992fd78b3bd4d55d5"}, {0x10}, {0x38, 0xff, 0x0, "256bb008c19718a9706f0ce920ac62a9490b858e29ac749251d3a8ba173d0cb17e"}], 0x98}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000006840)=[{0xff0, 0x10e, 0x0, "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"}, {0x10, 0xcba6cf4ea84d876e}, {0x10}, {0x10}], 0x1020}}], 0x7, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)={'#! ', './file0', [], 0xa, "c40876ceac0d6a21e2c7482c09060d258dad44f49947432b9ab11d416ea1dff1e535a2361949e394d19a9c68256b7d06306214fbbda732d296c26b01e2815331afde1a0bab24f6f99d39c46f43052b4bfad44344a8d56f67694d27f2ea3546d196ccdaf2db68e52887b280be9426a75409cdd5651b91e9bcd9bbc11b22a30727457463ef58ae6a4fd07c613d55ab622aef93d72297ed7904c94e35dafb2bc513bbd8c8feac2c2d448e20e6b3fd353b89f7ae7760c24d80126a6c442f97c5b60047d0d20a8e7f5f0d40990827c922f3d4a82e0311e69f244c45792530278201aaf4c8b7eb2d24165f009ab2dcd04dfd97947350188438fee08db121392c4cb54fa434a98dcc796b8798d2c1b5f777b6a9809df025627b57370e4f2fe155029a035821620998b46deb734b71a67c0ea03002671c15f54d320807854655c47e6d48d0abf7c0693b92fd1042fb027137001a15ac45af6bbd136e1a3d1bfc518d3ce460a54b0ffe1b7879df81616dec29bd35e2d719f1208bd6b5657f2d8ed8bc739ffc63e9cd9123412f9945664dcc2d4f4cac9b9fe3aa452da8d4bec1981aca49815ee7eeb5cc70f4ad0631ea7b62628d739fdd3284ca304ec3d260eb3c7ba303f89ab35a2764e1a6016542614ed1623676e7a8686c840d7f49aa78b8f18906b383f05a966d8dcf447a70fa8d0d744dda39b62e5c944c982fdef39cdfaa0c9a875aa6e42958dbccc0d82047247340845d53c91f0997954457c979d5efffaf65ff5eb8315ce63f78a2d7c2167b44b65a7f0054fd120addb97409467e67329891f127328b847c01bfaad775a90ea4cb31affbeed412ecb569b0f45644255c0f638ec5228c7af1bdd6dff536626a25035eb2c992a49ae4564247122bfdc3d00ecb1ba36a850e323b0420a74f02e752fa55c2a301105fa775c4f6d7f2054648ce1f5eff2ac7a64b07a13ecbe1992d049e46154355a22b968a3cd75dfb2d24d5b1a933243f79cf0eedb059d675531e7f6323f80cc5701976b94d9e7fbc275d84f1d88a7cea4a98c01aee5d50c60bb60d9ceb30a216c87c2e5a07d30ec8a5d489393a6095117f2c08c07addbdffd94fdde048247e091e44eca65bdf2b456477bc39f685a4249c2a9816f552986281fcb821a339a78dbb43428564c4e850e846a3c6b70574c90be9402ef41974a3f85a387f9528859b82a409b400a0388997e23af08180542f9761df6620f149c717fa1dd4c60d0f6213b1dd6d140ded446544c0279d620bebf4ae3298c42eba5e9da33fdeaefb1d0a879b037f6d0c272d9658acd0679d934ff9d1c8e307c2071aed08b880cf3973ab6f7612091a0f5908fd967e91da2a75e9a0b12ab202b5b7df5d9b10fe6ede16fc586bf099c365bf55a3e2f73bd7c2f470af3eab9afa7d38c522742ab1412537188a2d42054897310e87a4d0d7e56c8f8a057d499e4fb4d940b32137ebc7ad00734404f7390f3db01eea16cb80e340be316446a8ce4c5d446ea6b3491f706d6c4d8c08aea6953ffc101b7286bfd4272a022329d012cadf34e3ddf6bbf0a1f1bca2259f35d85dd20c1183a367d206f0cf69c4db7fd675d9c07fad0b23bf4dd44a73392ef723bdea6b1fb616a982d324c541bef9f15610ecd004c0a9fa1ba79eb709fdff8beb0dcd7539c5cf3bd1cfd62da98f039cc32a4582d13b3a23dd80638c6761e5873194fc184c3f4a171c0f955cff266134e8e91046bb73229add44a4bd1a8385086df915e1b4a22da9db1a11499b0a8ba7f5b96ab5c13df5dc4dfe7ac405cf56b36f91d26f3e0c6b434a0f414ffebfd535e4441479cb3c8c4317ed29c232b69b088576adb0076488d2e01eeced794352f1a792e5b3033c6a79ee78f0052f4adbfff66ccc1a6ccb2ba421a9ed57b6e54c239d03e50608c7280f71ef773ef27e5184d7e6d8a8dab76630f55137033ccf2e60afb51bd2e6606083b0f684faeeaeb081dbb5a11e25f769441a44f2f9e69ed245ed75564ced1c6f374cbc7bb18184017e551af93cb84a6470b2201c67c3f23d2d800582716d94fe4fd1f95471af4d98b89d6462ce1ab3762aa45dd49323c9414ba823ddc330465d1edd2a1ef870b104ce49f5d655ab00334a3740508fb1c9b51ecc9bb4737e57e20b58d6381cd0360e0b1501e1974b1ae9c643ea91cabdd6973aba3298ec5d46c4eb138483ecbf75d1df50f49d1d7661bb1d1d41631362e4e14e0a3b2e8d0da2748741bf35e846e534ecb40d513b56e534a651b16d60b56df575f974a5913ce0f6dce647e005e2e428526c3435f48dad9700f5dd7f014370c8f0d38cc0185bfbef52f7a251aa4840c76770ed653abdfc2be066f0b5b65e34577ece38fa0fc4d84088b487b03f85ef4c78db2c72666760a22e0c74e67ed4aa551349344fdc1aaf055411a4dcbf8d6328168b531193f410fcd155c2c9be358acd6e2e7625e27c25d7367879a748cc52c16509928efc7a46efdff202f060b769a25adf35c6da1655fa4ff2d6f7598db155a12b9910ed394e93b3db2e03e1abd3d3d2355a84b2d3863dc746a777f92ba25ec9ceb64ae42ca85ee0faa8e0821320a9b9c8603a599098fc9862c1ff7e96e8ec4e47201ce2303b4c50a15308d1f3d18c29a61fc213784bc181a4cb75722f0b206506cbe3e39da82440ec2796dfc4b8190c9780ad00301af0afee1ea0b1b8df784d67813dc77ce3ced071e38fcbee9b316efa56a0697627761a5956f6e40139344deb9a5366dbf07d6232a2df6724d213ea7bc1337b2e906f131d83b2d9fc262e2dfa21dc2a9480dffba548a7188ebbc4d8cca725f8f45493acc8dabcb76de60ca824cf944ad9e669f17a6a728ee69e98aeda5fde7c19e97e3c9c6eb371e4b8e8f875d8717e257ac6ac6f0e3dbb4bcbded5a7ae0b7e81379d65ad2f9fb32e438b703698299e6549b0e2241b3a9bc26dee06edac7a7b2a89c63c0b19a0513418eff2af9fb6e659c4e334d8b251b1474c06b9e9fc939b3a1246a426da6fd80702dca12b87b70e2d6111056c35953349c745db979fb8412a629337c46f14565495976900359e2362eb370ef151320295992d8389950e4a6af16b108fa6ccd5b02287e67c4c91f74eabcec7cbc6b7ac52f6af2dc1902c8f47d1cc63a913a7c14b4c24801eb0b5c128c59064f19c85f549c41702baba39382683d3d69ef7f3f059562334c532e1e2f42034fa9d7d911becc464dae11ede59231a6f1e792ba9f87e331773db4dc646dcbb178bb083ec881b3acc312cc4b48c2e2bced7514ccdca1e74e26928b942ff8f7d09f32776eed53efbb2bae65c7aa6c33d7f295ccc6407ed84d2f7987ca9f4c11a69b93efb7958bad673ce27757acc3b5413d50ad00bde629cee3252fae9cde9cdc621d22abb1aacdbd412fcaf398a946b2958ace32ec1d5a7901492e283e4e988438ee0a5f22877fd4f60ca3b8f2ebc5e849ad0f0d0c8ea81e775a3a6773e85b7410d639777c0a73d4c2d063e600942102c73934138e7b7735cb6f9a574ca386b12b98b40f26c7a6459bc01cbb1e6db18757e83914e3ed5c2127f84f781b61bf45344ba2dc2e18b8bc41e8a669b580a6b3b8e5194629255201150753485b949a07ca2c15892ceca911d92350ec8f4d64bce350e635ce9af4a67c65309ef480d0d277420f8655c86e24cae114eb13653232ad1cde42e5bbb4ba4d6897ba6548c2d2efa93cf5b4aa58632ad5677f8c2dd40570527f26c5e10a3cee8a799f49f47020183e4478b57aa407295e05d786b048632735172deea5e384b0baa254e9fd4454e4d73e77ef12fc4ae7ec00c5dae6eb0c54ea781f6264067efffff8121e8f39f925c4c21a11715f13ad1713641b251cc5b68e7d2707fc284de77b4bd4c8e6b541698a9297482aefd4ff455b2e79e2ccba2d6289f96460211ce59f19fef14d2132766d0b594e3d702459c149342eca88704e3ea870372041371406a1b5dea03d93306540940b589044ed3e1a1c4cc8a160425b5681ade1bef113c43ebcff1ba67b0c0d29458a6aec74d21808d4115cce0e4c56b14e9bfb2a91711e0f230a657881dc74f5eff1a1f202586f567d4ca6efb4ca7253dc7d97ebdfa0efa1dbdd47df5cb0888147b8898ddd5fbad5b2622cb16da52d0b212a9cb8caa9a4e225d07e80e795ae940481de611f2326725cc12dc546eab1ad7ee6c7501bc46fa69011fc9d769044920d9b1fcb4351774794e5c3d07759c2c580003b404238dcb5a032b7f17ee2e92a2ed1c5a9796db27ee48e1f994acc37bd8eb4a2a3f11e1d7d896d0267059837c1ac80e445271989580cdab7256adf756a07e7f65bf77e8428cd2c8a3e994677b6247abb05041787fca25a0fa2f4cc6488df0f728e6ba4878556cfc379ccf9066a8d5944274ab1207f4d1aa0a2fe6345120d22d68c046d11902445d091f249e"}, 0xc47) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 14:41:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) dup(r1) r2 = socket(0x80000000000000a, 0x2, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x14, &(0x7f0000000140)={r4}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)={r4, 0x29, "6a6685220898597d352e3c6df76aa1454237c24b927abe286e68179184dc869a6e4a34dda298eeffda"}, &(0x7f0000000180)=0x31) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) uname(&(0x7f0000000080)=""/105) 14:41:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000030000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2149.363450][ T5130] device vlan813 entered promiscuous mode [ 2149.405183][ T5139] device veth1663 entered promiscuous mode 14:41:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = dup(r1) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) dup(r3) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x23}, 0x9c}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x9, @private1={0xfc, 0x1, [], 0x1}, 0x5}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e21, @multicast2}], 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="00020000", @ANYRES16=r4, @ANYBLOB="170900000000000000000100000005000700000000000800090000000000c80002000100000008000a000000000808001800ffffffff08001900ac141400"], 0x44}}, 0x0) 14:41:44 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0xffe}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x5c}}, 0x0) 14:41:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x48}, 0x0) 14:41:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0xfdca) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:41:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000050000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:45 executing program 1: syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYRES64, @ANYRESHEX=r0, @ANYBLOB="170900d80000000000000100000005000700000000000800090000000000060002000100000008000a0000000000000098ac8de424042ae426a42d5f427b3de330398383955565a5ac4e3f765ef2052b1836295f80e4818505e472616fceae1e459f6e3c20dbe41edb98e9"], 0x44}}, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x800, 0x0) write$ppp(r2, &(0x7f0000000100)="b0c482f0e01708e8007468350e5b761e0f4fba51b97bfc6a280ab114458684634fa92957ba89c4", 0x27) 14:41:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000060000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:45 executing program 5: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x4, 0x288, 0x160, 0xcc, 0x0, 0x0, 0x160, 0x218, 0x1f4, 0x1f4, 0x1f4, 0x218, 0x4, 0x0, {[{{@ip={@loopback, @local, 0x0, 0xffffffff, 'syz_tun\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xcc}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x1, @broadcast}}}, {{@ip={@empty, @rand_addr, 0x0, 0x0, 'vxcan1\x00', 'veth1_to_bridge\x00'}, 0x0, 0x70, 0x94}, @REJECT={0x24, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x94}, @REJECT={0x24, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x2e4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20, 0x9}, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_1\x00', 0x10) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) r2 = accept4$unix(r1, &(0x7f0000000440), &(0x7f0000000e00)=0x6e, 0x800) bind$unix(r2, &(0x7f0000000e40)=@abs={0x0, 0x0, 0x4e23}, 0x6e) pipe(&(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x801, 0x0) r3 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_1\x00', 0x10) sendto$unix(r3, 0x0, 0x0, 0x0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) [ 2149.977607][ T5167] device vlan814 entered promiscuous mode [ 2150.020932][ T5172] device veth1665 entered promiscuous mode 14:41:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)={0x50, r1, 0x917, 0x0, 0x4000000, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @loopback}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) 14:41:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x103, 0x1}, 0x20) sendmsg$inet6(r0, &(0x7f0000000100)={&(0x7f0000000040)={0xa, 0x4e25, 0x0, @empty}, 0x1c, 0x0}, 0x0) 14:41:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000012060000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x4c}, 0x0) 14:41:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000007c0)=@filter={'filter\x00', 0xe, 0x4, 0x2e4, 0x94, 0x94, 0x0, 0x250, 0x0, 0x268, 0x250, 0x250, 0x250, 0x268, 0x4, 0x0, {[{{@ip={@multicast1, @multicast2, 0x0, 0x0, 'veth1_to_bond\x00', 'gre0\x00'}, 0x0, 0x70, 0x94}, @REJECT={0x24, 'REJECT\x00'}}, {{@uncond, 0x0, 0xc8, 0xec, 0x0, {}, [@common=@addrtype={{0x2c, 'addrtype\x00'}}, @common=@unspec=@connmark={{0x2c, 'connmark\x00'}}]}, @REJECT={0x24, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x340) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) close(r3) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket(0x2, 0x2, 0x0) write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYRES64=r4], 0x4240a2a0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x31}}, 0x10) connect$inet(r3, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x19401, 0x0) 14:41:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000500)="e987aa680c7218c887fe8846c0a54e06997fa31af56ddb1700cf500af14e9928", 0x20}, {&(0x7f0000002cc0)='o', 0x1}, {0x0}], 0x3}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000090000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2150.495949][ T5204] device vlan815 entered promiscuous mode [ 2150.546392][ T5208] device veth1667 entered promiscuous mode 14:41:45 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000002c0), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 14:41:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x60}, 0x0) 14:41:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x4c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000cc0)={'syztnl1\x00', &(0x7f0000000c40)={'syztnl1\x00', r2, 0x4, 0x7, 0x9, 0x411, 0x24, @private0={0xfc, 0x0, [], 0x1}, @local, 0x8000, 0x8000, 0x3, 0x3ff}}) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x4c}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000014c0)={&(0x7f0000000d00)={0x784, 0x0, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8}, {0x138, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xfffffffe}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x1d8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x400}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x80000000}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x180, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0xbd}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0x7, 0xec, 0x66, 0x2}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r3}, {0x140, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r6}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x5, 0x3, 0x3, 0x9059}, {0x1000, 0x0, 0x6, 0x2}, {0x8000, 0x80, 0xe0, 0x4}]}}}]}}, {{0x8, 0x1, r9}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}]}, 0x784}, 0x1, 0x0, 0x0, 0x81}, 0x1) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r10, 0x917, 0x2, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x71}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x44}}, 0x0) 14:41:46 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0x60], @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x18, 0x3a, 0xff, @initdev={0xfe, 0x88, [0xff], 0x0, 0x0}, @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @remote}}}}}}, 0x0) 14:41:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000a0000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2151.017777][ T5231] device vlan816 entered promiscuous mode [ 2151.066099][ T5236] device veth1669 entered promiscuous mode 14:41:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000b0000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x68}, 0x0) 14:41:46 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000280)={0x31, ""/49}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB='D\a\x00\x00', @ANYRES16=r3, @ANYBLOB="170900000000000000000100000005000700000000000800090000000000060002000100000008000a000000000008001800ffffffff08001900ac141400"], 0x44}}, 0x0) r4 = dup2(r2, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x34, r6, 0x905, 0x0, 0x0, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) sendmsg$DEVLINK_CMD_GET(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x70, r6, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x70}, 0x1, 0x0, 0x0, 0x804}, 0x4040) 14:41:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002900)=[{0x0, 0x0, &(0x7f0000000600)=[{0x0}, {&(0x7f0000000240)="4c7e775c8e5df9d8f1f2415d9dbc938aa00c6e14e3552f0fcc2940ef4cf43206e4661e103413c399adfebff0426e5a143c86245f2c8c8f803a6b491af1d4e5f311", 0x41}, {&(0x7f00000002c0)="9cd23b0223fb8b118ce35bc8a4057182ec97288d8c0736a113dd6f3005ffeaf1edbcd92f222ebe6de785425b1d8c90b2db6f7f21882c641bd8510410f63175bc8d992c3f82e9075c2b677c5dd5a4c39a30816bdb00b559f3eddc90734e0d5712691d9b6da12892cb6236d3ef81cc1f97388c1a5b18b6f3447dc04b4786d527b90c4d", 0x82}, {0x0}], 0x4, &(0x7f0000000680)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x2c, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x2c}}, 0x0) 14:41:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000e0000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:41:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)={0x48, r1, 0x917, 0x70bd28, 0x0, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7fff}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x48}}, 0x0) [ 2151.528907][ T5257] device vlan817 entered promiscuous mode [ 2151.587783][ T5263] device veth1671 entered promiscuous mode 14:41:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000500)="e987aa680c7218c887fe8846c0a54e06997fa31af56ddb1700cf500af14e99282f53a767ddd61b2c9f2f4c7ff03180404619258d38a1c047c76e39657addafb71a68f264e494282aa705e201e39e366758fd852acc59fac7a818544412aee5422b7cb1000000000000000000000000000000fb1760054ad3402437b8f9a1719a382401f99f39b57fac982dfeb6def50480ee783ec7c7b66a4d0868b6140a24a80f43e84db6e0f215a03759b3906f275e919d727a75e5347e56818f1c5bf9651461b3e6f181e48049f0993645af32909d19942b3a7c0f8f447cede86df4be1f7f2d05a0fa5ea4658fe546aded35812efa", 0xf0}, {&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b113", 0x1d}, {0x0}, {&(0x7f0000000400)="73f5f091ba236670b60286e326", 0xd}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71", 0x14}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2151.629528][ T5257] __nla_validate_parse: 14 callbacks suppressed [ 2151.629537][ T5257] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000f0000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x6c}, 0x0) 14:41:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="af66a43aff2c70380078bed27368c5a3c271559fe9aa58803817902e014cac486929847089585f714b90987d4c3e242d8aa491f65b05d7525290f2b337a9ec6986daae673203eccf5351ce349b594f855bfe572b38f78f10b32a75a86f9d98bd1e924d709ca40f933c5665eb89a725e18e62b1e95a5923564fa8925c85f94c9860197e5bfb70476411c5f082516bb95df6255fb9d780fc8d429ebc1c250b12b102f2037e37a4028590ce5d0a6ec3d7424b1eea894b81f4b90b0706d453ce6a327c48be9a2a21171902809a3b6a11", @ANYRES16=r1, @ANYBLOB="170900000000000000000100000005000700000000000800090000000000060002000100000008000a000000000008001800ffffffff08001900ac141400"], 0x44}}, 0x0) [ 2151.837550][ T28] audit: type=1804 audit(1595342507.192:472): pid=5285 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=18194 res=1 [ 2151.875323][ T5287] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000500)="e987aa680c7218c887fe8846c0a54e06997fa31af56ddb1700cf500af14e9928", 0x20}, {&(0x7f0000002cc0)='o', 0x1}], 0x2}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000110000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2152.090305][ T5292] device vlan818 entered promiscuous mode 14:41:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000007250934d55d3ceb3c51c9b5f0ad506db44f2fee88af178ff40e47ef5c8eb0adcadc468494ee10c1f3d20d88ece00a1384f21c1b8fa6f2fd3c6c2755a4cf944a6c033a4f535d63ebd1e6d07a2911293c3c91d91ef4c5996b2d33b89450607ad72d43875e4b5ecea33f15abe4fccc602b837ffff000000000000ac5fba77", @ANYRES16=r1, @ANYBLOB="170900000000000000000105000000000000000000000800090008000000060002000100000008050a0000000535a095186ce348dd36e1b4a5f8000008001800ffffffff0800190800000000"], 0x44}}, 0x0) [ 2152.176376][ T5295] device veth1673 entered promiscuous mode 14:41:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2152.227770][ T5292] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x74}, 0x0) 14:41:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000500)="e987aa680c7218c887fe8846c0a54e06997fa31af56ddb1700cf500af14e9928", 0x20}, {&(0x7f0000002cc0)='o', 0x1}], 0x2}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000120000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0xfffffffd, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x44}}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, &(0x7f0000000080)={0x3, 0x100, 0x400, 0x74f, 0x1, 0x414}) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000003c0)={0x7, {{0xa, 0x4e21, 0xef, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xdc9c}}, 0x1, 0x5, [{{0xa, 0x4e21, 0x6, @private0, 0x40}}, {{0xa, 0x4e24, 0xffffff80, @mcast2, 0x14}}, {{0xa, 0x4e20, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xf5}}, {{0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, [], 0x1}, 0x9}}, {{0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, [], 0x1}, 0xba9a}}]}, 0x310) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r4, 0x4080aea2, &(0x7f0000000180)={[0x6000, 0x4, 0x2, 0xf000], 0x2, 0x42, 0x1}) [ 2152.473278][ T28] audit: type=1804 audit(1595342507.832:473): pid=5319 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17141 res=1 [ 2152.553140][ T5323] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002900)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000080)="b0d65cb8c7e6b4708b0b4533c6a1f6da5d", 0x11}], 0x1, &(0x7f0000000680)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000006120000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2152.839024][ T5327] device vlan819 entered promiscuous mode [ 2152.898170][ T5329] device veth1675 entered promiscuous mode 14:41:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000500)="e987aa680c7218c887fe8846c0a54e06997fa31af56ddb1700cf500af14e99282f53a767ddd61b2c9f2f4c7ff03180404619258d38a1c047c76e39657addafb71a68f264e494282aa705e201e39e366758fd852acc59fac7a818544412aee5422b7cb1000000000000000000000000000000fb1760054ad3402437b8f9a1719a382401f99f39b57fac982dfeb6def50480ee783ec7c7b66a4d0868b6140a24a80f43e84db6e0f215a03759b3906f275e919d727a75e5347e56818f1c5bf9651461b3e6f181e48049f0993645af32909d19942b3a7c0f8f447cede86df4be1f7f2d05a0fa5ea4658fe546aded35812efa", 0xf0}, {&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09", 0x70}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b113", 0x1d}, {0x0}, {&(0x7f0000000400)="73f5f091ba236670b60286e326", 0xd}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c", 0x17}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2152.951570][ T5327] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:41:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000130000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x7a}, 0x0) 14:41:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:48 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0xf0}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x54}}, 0x0) [ 2153.182233][ T5355] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = shmget$private(0x0, 0x1000, 0x200, &(0x7f0000011000/0x1000)=nil) shmat(r3, &(0x7f0000000000/0x13000)=nil, 0x4000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0xc0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000008c0)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000100)='l2tp\x00', r4}, 0x30) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x40) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r6, 0x0, 0x0) r7 = dup(0xffffffffffffffff) kcmp(r5, r6, 0x3, r2, r7) shmat(r3, &(0x7f0000ffc000/0x1000)=nil, 0x7000) r8 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r8, 0xc0605345, &(0x7f0000000080)={0x5, 0x1, {0xfff2d47b154533f1, 0x1, 0x10001, 0x3, 0x57c}, 0x200}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="44806c09", @ANYRES16=r1, @ANYBLOB="170900000800000000000100000005000700000000000600030000100000060300000000000008000a000000000008001800ffffffff08001900ac141400"], 0x44}}, 0x0) 14:41:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000631d0000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2153.339283][ T28] audit: type=1804 audit(1595342508.692:474): pid=5366 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16847 res=1 [ 2153.459391][ T5358] device vlan820 entered promiscuous mode 14:41:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="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"], 0x44}}, 0x0) [ 2153.501407][ T5362] device veth1677 entered promiscuous mode [ 2153.535415][ T5358] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 14:41:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000004e210000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xf0}, 0x0) [ 2153.713797][ T5381] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2153.783339][ T5386] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 14:41:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2153.844155][ T5388] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)={0x14, r5, 0x1}, 0x14}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x242}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r5, 0x300, 0x70bd2c, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) socket$packet(0x11, 0x2, 0x300) 14:41:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001140)='/dev/loop-control\x00', 0x201, 0x0) r1 = dup(r0) getrandom(&(0x7f0000000080)=""/4096, 0x1000, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, 0x0) 14:41:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000003f0000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2154.063991][ T5392] device vlan821 entered promiscuous mode [ 2154.101852][ T5394] device veth1679 entered promiscuous mode [ 2154.159748][ T28] audit: type=1804 audit(1595342509.512:475): pid=5408 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=18178 res=1 14:41:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x300}, 0x0) 14:41:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000214e0000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:49 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$CHAR_RAW_GETSIZE(r1, 0x1260, &(0x7f00000001c0)) 14:41:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="170900000000000000000100000005000700000000000800090000000000060002050000000005cfc9b0bc1499620007000390440072ea8813965bb070fde4aebcd1bcff08001900ff"], 0x44}}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000080)=0x5, 0x4) 14:41:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000600000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:49 executing program 4: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xa, 0x30, 0x4, 0x3}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0x88, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) 14:41:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2154.697599][ T5425] device vlan822 entered promiscuous mode [ 2154.729471][ T5430] device veth1681 entered promiscuous mode 14:41:50 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/97, &(0x7f0000000100)=0x61) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) 14:41:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x500}, 0x0) 14:41:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000001d630000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:50 executing program 4: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xa, 0x30, 0x4, 0x3}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0x88, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) [ 2154.959169][ T28] audit: type=1804 audit(1595342510.312:476): pid=5450 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=18039 res=1 14:41:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="02a0690117defe3e2f1709000000000000000001000000050007000000000008000920e11ee616d295b73fbf0d527900000000060002000100000008000a000000b2911a4999b25202a916ad0000080018976dee59ff08001900ac141400a03c30f5795f8a2dbe8daacaa085d0f789d284e7311f9d4ef43ddbfb437be3e09e855d6e43855d3be1a01db942926718ed1dac"], 0x44}}, 0x0) 14:41:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000f00000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2155.221939][ T5460] device vlan823 entered promiscuous mode 14:41:50 executing program 4: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xa, 0x30, 0x4, 0x3}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0x88, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) [ 2155.263254][ T5464] device veth1683 entered promiscuous mode 14:41:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)={0x4c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x4c}}, 0x0) 14:41:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x600}, 0x0) [ 2155.652038][ T5485] device vlan824 entered promiscuous mode [ 2155.669903][ T5480] device veth1685 entered promiscuous mode 14:41:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:41:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000400300000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:51 executing program 4: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xa, 0x30, 0x4, 0x3}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0x88, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) 14:41:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(r2, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x48, r4, 0x2, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1000, 0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xe36, 0x2}}]}, 0x48}, 0x1, 0x0, 0x0, 0x40010}, 0x200080c1) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') pipe(&(0x7f0000000880)) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r5, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r6, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) syz_usb_connect$cdc_ecm(0x4, 0x87, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x75, 0x1, 0x1, 0x7, 0x80, 0x9, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x1f, {{0x5}, {0x5, 0x24, 0x0, 0x8}, {0xd, 0x24, 0xf, 0x1, 0x6, 0x8001, 0x2, 0x6}, [@ncm={0x6, 0x24, 0x1a, 0x7fff}, @mdlm_detail={0x28, 0x24, 0x13, 0x0, "b1c453081c296909bf0841b7e056e278df1333c48597933b3e9449c815d12cbe0f758cbb"}, @mbim={0xc, 0x24, 0x1b, 0x4, 0x1, 0x6, 0x0, 0x9, 0x80}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20, 0xfd, 0x81, 0xea}}, {{0x9, 0x5, 0x3, 0x2, 0x420, 0x2, 0x3, 0xff}}}}}]}}]}}, &(0x7f00000006c0)={0xa, &(0x7f0000000200)={0xa, 0x6, 0x250, 0x72, 0xb5, 0x9e, 0x8, 0x35}, 0x5, &(0x7f0000000340)={0x5, 0xf, 0x5}, 0x7, [{0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x2409}}, {0xb0, &(0x7f0000000400)=@string={0xb0, 0x3, "c2475d42ec8827e48a91105948ac69e18ed6d3dbf5ee04eaf71160605735691ca9885d0b604b04f6bb3f12cf5e05b7b2c9f12afeb7fec3aa01774a8c670421081f065a991b7df0d8c3bedcf78cfcc67a35a17497f6ec4e28dac33e1de6b550f285cc1fcea670e7c26a73309779f72d7c5d38ea95e55442932bb3d483a30e3707e944398824051eb213aacfb691b255fb03d6452619b9a77c682a04ee6dc5217e031bea5c7ce92a91a29b4796bc87"}}, {0x31, &(0x7f00000004c0)=@string={0x31, 0x3, "71cdeb0716e16844c67f3506bafc70e72778706bf752ead1f36a931558b853e24b601bde5adfa675fc94c41e9aaac8"}}, {0x4, &(0x7f0000000500)=@lang_id={0x4, 0x3, 0x40f}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x380a}}, {0x9, &(0x7f0000000580)=@string={0x9, 0x3, "c6a05ccde42a78"}}, {0xed, &(0x7f00000005c0)=@string={0xed, 0x3, "9e70c48f797aaa76813c4f145069ec7336096fd3c60a09e0b6f9bc07c26465c90635f0f345a92068db4a40baac19a9aa3008b4ede0731bacc39e67f332964f8312d5f77309886f5a978977f561a9980f91a77030d4f49beefb1f0c41a3c9120e9b9803cb0a1a1ee195c174754450e3c8aac52dc8fb36b470f82c4bdb16ca4cdbafff1c34e656a28acd66f79550e64a8bbabc38daccd53c304af4ce779d8ec5b2dd1be36eab2af0e9b8de2303b6b3c0cd3da86c25aa65bea10be7841326a9ef4c962d8ff1b10617b41ce70e26533b0cf05a6506d48b4c0a9be3c3681283318698ac6e8f87708c3c47d86a54"}}]}) 14:41:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x700}, 0x0) 14:41:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000034000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:51 executing program 4: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xa, 0x30, 0x4, 0x3}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0x88, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) 14:41:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2156.062026][ T28] audit: type=1804 audit(1595342511.422:477): pid=5509 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=18516 res=1 14:41:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000fffff000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2156.138358][ T5508] device vlan825 entered promiscuous mode [ 2156.185637][ T5512] device veth1687 entered promiscuous mode 14:41:51 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec={0x0, 0x0, 0x4}, 0x80, 0x0}, 0x0) 14:41:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000001000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x900}, 0x0) 14:41:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)={0x48, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0xfffffffffffffe21, 0xa, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x40}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x48}}, 0x44801) 14:41:52 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x7000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf086dd1fffffff0e003300630277fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) 14:41:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:41:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2156.862456][ T5538] __nla_validate_parse: 11 callbacks suppressed [ 2156.862467][ T5538] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000002000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:52 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2157.096545][ T28] audit: type=1804 audit(1595342512.452:478): pid=5553 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16905 res=1 [ 2157.156686][ T5543] device vlan826 entered promiscuous mode [ 2157.183494][ T5546] device veth1689 entered promiscuous mode 14:41:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000003000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:52 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2157.212168][ T5543] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 14:41:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000004000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:52 executing program 4: 14:41:52 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2157.489994][ T5566] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:52 executing program 4: 14:41:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000005000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2157.716798][ T5569] device vlan827 entered promiscuous mode [ 2157.747715][ T5573] device veth1691 entered promiscuous mode [ 2157.788960][ T5569] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) recvmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:41:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000006000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:53 executing program 4: 14:41:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xc00}, 0x0) 14:41:53 executing program 4: 14:41:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000008000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2158.073969][ T5594] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2158.084612][ T28] audit: type=1804 audit(1595342513.442:479): pid=5595 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17201 res=1 14:41:53 executing program 4: [ 2158.229890][ T5599] device vlan828 entered promiscuous mode 14:41:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) recvmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2158.277423][ T5602] device veth1693 entered promiscuous mode [ 2158.318562][ T5599] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000009000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:53 executing program 4: 14:41:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 2158.565182][ T28] audit: type=1804 audit(1595342513.922:480): pid=5620 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16931 res=1 [ 2158.569807][ T5622] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:54 executing program 4: 14:41:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000000a000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) recvmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:41:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x14) writev(r2, &(0x7f00000000c0)=[{&(0x7f00000003c0)="390000001369090069000007a2e407edab00805804000000000003f5000000000000ef38bf461e59d700"/57, 0x39}], 0x1) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f00000002c0), 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYRES16=r5, @ANYRESOCT], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="50200000000062f6e9a5d02bf5de58aeef00"/28, @ANYRES16=r5, @ANYBLOB="01002ebdf927bd7000fbdbdf2501000000080001000300000008000200010000000cc90b800504030005000000080002000200000008000200"], 0x3}, 0x1, 0x0, 0x0, 0x8c054}, 0x48080) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000009c0)=ANY=[@ANYBLOB="0061a9002200f4f071e690521d79ec2df20a1921292b81a9ff0700001853f6caa7bee88f97c39fa1a81e3bdd3b2a22728650938e7081aa8a", @ANYRES16=r5, @ANYBLOB="00032dbd7000fedbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x40800}, 0x2044011) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="b00100ff", @ANYRES16=r5, @ANYBLOB="00002bbd7000ffdbdf650100000004000c802c0004800500030006000000050003000100000005000300080000000500030006000000050003000700000008010c8014000b800800090012bae65b08000a00c228000024000b800800090035a5b71b08000900bccfaf4608000a0012f8000008000a0098ac000014000b8008000a00f9aa000008000a0004c000001c000b8008000a00c551000108000900d811e136080009008a14551c0c000b8008000900248953271c000b8008000a00178b000008000900d1e1d74f08000900f7b8f96f24000b800800090035fc9d170800090061a4947f08000900ccb23b6f08000a0065ce000004000b804c000b80080009004911722708000a00dc32000008000a005fe3000008000a006fa5000008000a001602000008000900647ba42408000a00310d000008000a0009510000080009005ba5002d0800020001000000240004800500030002000000050003000500000005000300020000000500030000000000300008802c000780080006001000000008000500877e572808000500e77a94210800060078000000080005000bac245608000100ffffffff"], 0x1b0}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4241}, 0xc, &(0x7f0000000340)={&(0x7f0000000d80)=ANY=[@ANYBLOB="a4010000", @ANYRES16=r5, @ANYBLOB="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", @ANYRESHEX, @ANYRES16, @ANYRESHEX], 0x1a4}, 0x1, 0x0, 0x0, 0x24044040}, 0x6004) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000c674ad4f8cf84155cbf7a11cbec15b1ddccbf3f0ef01672520d8936516e364f8", @ANYRES16=r5, @ANYBLOB="01002cbd7000fcdbdf25020000002800088024000780080006003300000008000500320e107908000600dc000000080005009b1219360800010000000000"], 0x44}, 0x1, 0x0, 0x0, 0x11}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000bc0)={0x1a4, r5, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x40, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x39a9f937}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xe0e4cf8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x56}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x50f03b6e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x377aed42}, @NLBL_CIPSOV4_A_MLSLVLREM={0x0, 0x6, 0x36}, @NLBL_CIPSOV4_A_MLSLVLREM={0x0, 0x6, 0xff}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MLSLVLLST={0x30, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x20a7986d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x26}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6fd99434}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x43}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3446559c}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xc4, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x64c47124}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x595bc262}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x45}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfe}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5d19ac71}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e9b4356}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x58}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xad}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7e049987}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x16b2522b}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x43, 0x5, 0x537f6251}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x36d65754}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b786df3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x31f8ef4a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x588805fd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xb235d0e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x9db753b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b36a213}]}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x40010}, 0x44024) sendmsg$NLBL_CIPSOV4_C_LIST(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r5, 0x308, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0xd4) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x60, r5, 0x200, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) 14:41:54 executing program 4: 14:41:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000000b000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2158.974524][ T5623] device vlan829 entered promiscuous mode [ 2158.983196][ T28] audit: type=1804 audit(1595342514.342:481): pid=5645 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16889 res=1 14:41:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2159.047669][ T5624] device veth1695 entered promiscuous mode [ 2159.076381][ T5622] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:54 executing program 4: 14:41:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:41:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 14:41:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000000e000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) 14:41:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2159.391078][ T5669] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2159.405638][ T28] audit: type=1804 audit(1595342514.762:482): pid=5672 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17173 res=1 14:41:54 executing program 4: 14:41:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000000f000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:55 executing program 4: [ 2159.689733][ T5675] device vlan830 entered promiscuous mode 14:41:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2159.758484][ T5676] device veth1697 entered promiscuous mode [ 2159.798481][ T5675] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000010000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:55 executing program 4: 14:41:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x2000}, 0x0) 14:41:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:41:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000011000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:55 executing program 4: 14:41:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="4400ed00", @ANYRES16=r1, @ANYBLOB="170900000000000000000100000005000700000000000800090000000000060002000100000008000a000000000008001800ffffffff08001900ac141400"], 0x44}}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r4, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}}, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x34, r4, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 2160.222901][ T5702] device vlan831 entered promiscuous mode [ 2160.235737][ T5705] device veth1699 entered promiscuous mode 14:41:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000012000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:55 executing program 4: 14:41:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) 14:41:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:41:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) dup(r2) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 14:41:56 executing program 4: 14:41:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000612000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80, 0x0) recvmmsg(r1, &(0x7f0000002f80)=[{{&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/117, 0x75}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/61, 0x3d}, {&(0x7f0000000280)=""/29, 0x1d}], 0x4, &(0x7f0000000300)=""/2, 0x2}, 0x3}, {{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f00000013c0)=""/150, 0x96}, {&(0x7f0000001480)=""/191, 0xbf}, {&(0x7f0000001540)=""/231, 0xe7}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/177, 0xb1}, {&(0x7f0000000340)=""/27, 0x1b}], 0x6, &(0x7f0000002780)=""/25, 0x19}, 0x8}, {{&(0x7f00000027c0)=@x25, 0x80, &(0x7f0000002940)=[{&(0x7f0000002840)=""/208, 0xd0}], 0x1}, 0x80000001}, {{&(0x7f0000002980)=@pppol2tpv3, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002a00)=""/29, 0x1d}, {&(0x7f0000002a40)=""/66, 0x42}, {&(0x7f0000002ac0)=""/249, 0xf9}, {&(0x7f0000002bc0)=""/191, 0xbf}, {&(0x7f0000002c80)=""/111, 0x6f}, {&(0x7f0000002d00)=""/171, 0xab}, {&(0x7f0000002dc0)=""/195, 0xc3}], 0x7, &(0x7f0000002f40)=""/48, 0x30}, 0x7}], 0x4, 0x2, &(0x7f0000003080)={0x77359400}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="44020000", @ANYRES16=r2, @ANYBLOB="170900000000000000000100000005000700000000000800090000000000060002000100000008000a000000000008001800ffffffff08001900ac141400"], 0x44}}, 0x0) [ 2160.774939][ T28] audit: type=1804 audit(1595342516.133:483): pid=5745 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17361 res=1 [ 2160.784592][ T5738] device vlan832 entered promiscuous mode 14:41:56 executing program 4: [ 2160.934278][ T5743] device veth1701 entered promiscuous mode 14:41:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000013000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000005137214e0a78e8f802da7a7a53cc8a0782112a9698c285230cda2728e2f771e6f7e2228a757c68d47f8343490f6e227fba83", @ANYRES16=r1, @ANYBLOB="170900000000000000000100000005000700000000000800090000000000060002000100000008000a000000000008001800ffffffff08001900ac141400"], 0x44}}, 0x0) 14:41:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 14:41:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000003f000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2161.376492][ T5777] device vlan833 entered promiscuous mode [ 2161.384533][ T5779] device veth1703 entered promiscuous mode 14:41:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:41:56 executing program 4: 14:41:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000214e000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:56 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r0 = socket$inet6(0xa, 0x800000000000002, 0x0) dup(r0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRESDEC=r0, @ANYBLOB="1709000000000100000005000700000000000800090000f4ffff050002000100000008faff000000000008001800ffffffff08001900ac14140000000000594d586de43ba7ddc0b11b1eb9f5a3cd2791940e763375dc839e886b0feb9b98de440dc6f184830c35f32c32b75e75ee6cfca561a7e849a13ba6403c97c3f98d0d86370cfa32e50e13ab8a99fe52762f441e2aa81d7a07dfdab50ac819dd0c"], 0x44}}, 0x20000004) 14:41:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x4800}, 0x0) 14:41:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000060000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:57 executing program 4: 14:41:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000000c0)) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PIO_FONTRESET(r7, 0x4b6d, 0x0) ioctl$FBIOPUT_CON2FBMAP(r5, 0x4610, &(0x7f0000000100)={0x18, 0x1}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) 14:41:57 executing program 4: [ 2161.803117][ T5798] device vlan834 entered promiscuous mode [ 2161.847398][ T5802] device veth1705 entered promiscuous mode [ 2161.884770][ T5798] __nla_validate_parse: 7 callbacks suppressed 14:41:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000001d63000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2161.884779][ T5798] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:41:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:57 executing program 4: 14:41:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x4c00}, 0x0) 14:41:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000ffffff9e000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') tkill(0x0, 0x43) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000080)={0x7e, 0x4, {}, {r3}, 0x0, 0x9}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r8) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r10) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000000c0)={{}, {0x1, 0x1}, [{0x2, 0x6}, {0x2, 0x5}, {0x2, 0x84ce6b7b9f343fb5, r4}, {0x2, 0x4, r6}], {0x4, 0xa}, [{0x8, 0x5, r8}, {0x8, 0x6, r10}], {0x10, 0x3}}, 0x54, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="00000000ac49937d1d6a3039cf09f617882d6dc0ea13d2b3e5a04867bb17763be60e885e0e1027906f8190047f40ead3e0e9fe2930d25dff51de0770c7cc4c9076fee1c996703df9d7bb5d137e0a61b4d25af5d5a41c453e6ee3e428b78af34597e2fbfea47a83e69308115eda18ccbd33ab75ee12a77c5f386d5eb1524dfe07ebe7cf8d50fc2d2b83498a97fe6c68000000000000214a9a1502db2ae1d5ef9a1580cb02e48575cd9ffb6a79b7650eb7c54f9299b1", @ANYRES16=r1, @ANYBLOB="170900000000000000000100000005000700000000000800090000000000060002000100000008000a000000000008001800ffffffff08001900ac141400"], 0x44}}, 0x0) [ 2162.617131][ T5832] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:58 executing program 4: 14:41:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000fffffff0000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) dup(r2) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000080)=@generic={0x2, 0xf2cd, 0x3}) 14:41:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2162.804676][ T5837] device vlan835 entered promiscuous mode [ 2162.826238][ T5841] device veth1707 entered promiscuous mode [ 2162.874250][ T5837] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:58 executing program 4: 14:41:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x5865}, 0x0) 14:41:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x44, r1, 0x917, 0x70bd25, 0xffffffff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x4c, 0xa, 0x1}, @L2TP_ATTR_UDP_CSUM={0x0, 0xd, 0x1}, @L2TP_ATTR_UDP_CSUM, @L2TP_ATTR_PW_TYPE={0x0, 0x1, 0xb}, @L2TP_ATTR_PEER_COOKIE={0x0, 0x10, 0x100000001}]}, 0x44}, 0x1, 0x0, 0x0, 0x4080890}, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000000c0)={0x3, 0x0, 0x7fffffff, 0xb3, 'syz0\x00', 0x1000}) r3 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x8, 0x8100) read$char_raw(r3, &(0x7f0000000400)={""/9720}, 0x2600) 14:41:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000f0ffff000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:58 executing program 4: [ 2163.176804][ T5871] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2163.178440][ T5870] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000007fffffff000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2163.224362][ T5876] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. 14:41:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:58 executing program 4: 14:41:58 executing program 1: bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080), 0x4) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000000c0)) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) 14:41:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000009effffff000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2163.481034][ T5878] device vlan836 entered promiscuous mode [ 2163.524041][ T5881] device veth1709 entered promiscuous mode [ 2163.564232][ T5878] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:41:59 executing program 4: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_OFF(r0, 0x7004) 14:41:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:41:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unlinkat(r3, &(0x7f0000000080)='./file0\x00', 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[@ANYBLOB="44000000d60e29d0b7a5ecbd55eb506738557f05e0032c3e082b25b80ea692ca31731312ceebd399c0f30259143544afaf6b5bbd17a5a3109a591e4a5d19bdaa01ac761b7a6d39a12e097ce08ac95cd77c2c0afa6d668363f27348209b5cc6cfbafe2f4a956b266b92dc4ca57d4bd7ed5dd3a183c9f987bfedc7b4f6b346", @ANYRES16=r1, @ANYBLOB="170900000000000000000100000005000700000000000800090000000000060002000100000008000a000000000008001800ffffffff08001900ac141400"], 0x44}}, 0x0) 14:41:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000f0ffffff000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2163.913288][ T5916] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000340000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:41:59 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'batadv0\x00', &(0x7f0000000100)=@ethtool_gstrings={0x3c}}) 14:41:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40), 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2164.129715][ T5921] device vlan837 entered promiscuous mode 14:41:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="1709000000000000000001000000050007006b0000000800090000000000060002000100000008000a000000000008001800ffffffff08001900ac141400"], 0x44}}, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) getgid() r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) accept4$alg(r2, 0x0, 0x0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvme-fabrics\x00', 0x362c0, 0x0) recvfrom$rose(r4, &(0x7f0000000280)=""/118, 0x76, 0x100, &(0x7f0000000300)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x40) sendmsg$AUDIT_TTY_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3f8, 0x300, 0x70bd2c, 0x25dfdbff, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x814}, 0x40040) 14:41:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000fffffffffffff0000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2164.175183][ T5924] device veth1711 entered promiscuous mode [ 2164.203807][ T5921] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:41:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40), 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2164.828326][ T28] audit: type=1804 audit(1595342520.183:484): pid=5933 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16660 res=1 14:42:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff048) 14:42:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x6558}, 0x0) 14:42:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000010001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40), 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="010000000000000000eb01"], 0x14}}, 0x0) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x6c, r5, 0x420, 0x70bd26, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'geneve1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'macvlan0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20040011}, 0x8080) [ 2165.016325][ T5954] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000020001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:00 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'batadv0\x00', &(0x7f0000000100)=@ethtool_gstrings={0x1c}}) [ 2165.221241][ T5960] device vlan838 entered promiscuous mode [ 2165.250906][ T5964] device veth1713 entered promiscuous mode 14:42:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_generic(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x1e, 0x4, 0x70bd25, 0x25dfdbff, {0x7}, [@typed={0x8, 0x19, 0x0, 0x0, @u32=0x7f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x24040055) 14:42:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x6800}, 0x0) 14:42:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000030001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2165.712196][ T5991] device vlan839 entered promiscuous mode [ 2165.741610][ T5996] device veth1715 entered promiscuous mode 14:42:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000580)={0x0, 0x3f, [], [@calipso={0x7, 0x30, {0x0, 0xa, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0x1c6, "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"}]}, 0x208) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 14:42:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$HIDIOCSFLAG(r3, 0x4004480f, &(0x7f0000000080)=0x1) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) open_by_handle_at(r5, &(0x7f00000000c0)={0x27, 0x2, "1372b1c2ea5608e37cfa41cd630715ca2b5e64be41b7fbdfa20b0eb80d67f5"}, 0x84840) 14:42:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000040001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x6c00}, 0x0) [ 2166.302821][ T28] audit: type=1804 audit(1595342521.663:485): pid=5990 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17634 res=1 14:42:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2166.553175][ T6014] device vlan840 entered promiscuous mode [ 2166.562215][ T6020] device veth1717 entered promiscuous mode 14:42:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x3, 0x2, 0x101, 0xd}, 0x14}}, 0x0) 14:42:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000050001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x7400}, 0x0) 14:42:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=@md0='/dev/md0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='jfs\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000300)={0x0, @rc={0x1f, @fixed={[], 0x11}, 0x7f}, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x80000003}, @nl=@kern={0x10, 0x0, 0x0, 0x4}, 0x9, 0x0, 0x0, 0x0, 0x4, &(0x7f00000000c0)='veth1_to_hsr\x00', 0xeba, 0x64, 0x6}) 14:42:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2167.008930][ T6035] device vlan841 entered promiscuous mode [ 2167.043395][ T6041] device veth1719 entered promiscuous mode [ 2167.066574][ T6030] __nla_validate_parse: 6 callbacks suppressed [ 2167.066584][ T6030] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2167.098986][ T28] audit: type=1804 audit(1595342522.453:486): pid=6048 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17777 res=1 14:42:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:03 executing program 4: getdents(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x10d082) r1 = memfd_create(&(0x7f0000000040)='\xbb\x02\xb1\xed\x96\xdb\xb1,\x116\xe0\x89]\xad\x01\xc3r%;\x99\xbck\xe7=\xfa\xe8HB\x00\x00\xd7h\xa4\x06jt\xea\xf9l\x00\x00\x00\x00!\xf8\xac\xdc\x00\x00\x00', 0x0) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000200)="c5", 0x1}], 0x1, 0x40ee1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3fbcbab16c80fab, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000), 0x52698b21) 14:42:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000060001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:03 executing program 1: socket$inet6(0xa, 0x800, 0x4) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x48, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x2}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x101}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010100}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0x1f}}]}, 0x48}}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)={0x14, r5, 0x1}, 0x14}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000314bd7000fddb0025130000000cf06e0c00990005000000ffffffff06001200008000001c001180040005000400010004000700040002000400020004"], 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) 14:42:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x7a00}, 0x0) 14:42:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2167.935313][ T6057] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000080001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2168.194095][ T6063] device vlan842 entered promiscuous mode 14:42:03 executing program 4: getdents(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x10d082) r1 = memfd_create(&(0x7f0000000040)='\xbb\x02\xb1\xed\x96\xdb\xb1,\x116\xe0\x89]\xad\x01\xc3r%;\x99\xbck\xe7=\xfa\xe8HB\x00\x00\xd7h\xa4\x06jt\xea\xf9l\x00\x00\x00\x00!\xf8\xac\xdc\x00\x00\x00', 0x0) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000200)="c5", 0x1}], 0x1, 0x40ee1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3fbcbab16c80fab, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000), 0x52698b21) [ 2168.244871][ T6067] device veth1721 entered promiscuous mode [ 2168.289514][ T6063] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000090001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x8100}, 0x0) 14:42:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setns(r3, 0x10000000) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r3, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) 14:42:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {0x0}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2168.466547][ T28] audit: type=1800 audit(1595342523.823:487): pid=6090 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="loop0" dev="sda1" ino=16983 res=0 [ 2168.581753][ T6094] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {0x0}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2168.837769][ T6096] device vlan843 entered promiscuous mode 14:42:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2168.943079][ T6097] device veth1723 entered promiscuous mode [ 2169.037468][ T6096] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {0x0}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000000000000a0001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:04 executing program 4: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff01, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000025c0)=[{&(0x7f0000000180)="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", 0x27d}], 0x1) 14:42:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000000000000b0001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:04 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000001) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 14:42:04 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000100)=0x3) socket$rxrpc(0x21, 0x2, 0x2) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$inet6(0xa, 0x800000000000002, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$MON_IOCX_GETX(r7, 0x4018920a, &(0x7f0000000200)={&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000280)=""/106, 0x6a}) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x30, r5, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, '\x00'}}}}}, 0x30}}, 0x0) bind$rxrpc(r1, &(0x7f0000000180)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x8, @private0, 0x8}}, 0x24) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r5, 0x100, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0x8, 0x2a, 0x0, 0x2}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x20004440}, 0x4008000) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') 14:42:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff01, 0x1}, 0x1040, 0x0, 0x20, 0x8, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) [ 2169.542732][ T6126] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000000000000e0001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 14:42:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2169.733222][ T6133] device vlan844 entered promiscuous mode [ 2169.769309][ T6135] device veth1725 entered promiscuous mode [ 2169.807946][ T6128] tipc: Enabling of bearer rejected, illegal name [ 2169.834065][ T6133] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000000000000f0001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2169.873227][ T6152] tipc: Enabling of bearer rejected, illegal name 14:42:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 14:42:05 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x4, 0x4, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) 14:42:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) accept4$alg(r1, 0x0, 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000180)={{r1}, 0x5c, 0x0, 0x400}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r4 = socket$inet6(0xa, 0x800000000000002, 0x0) r5 = dup(r4) recvfrom$inet6(r5, &(0x7f00000003c0)=""/4096, 0x1000, 0x1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @private1={0xfc, 0x1, [], 0x1}, 0x9}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22, 0xffffa2fb, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7fff}, 0x1c) unlinkat(r5, &(0x7f0000000080)='./file0\x00', 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) [ 2170.112098][ T6163] ptrace attach of "/root/syz-executor.4"[6161] was attempted by "/root/syz-executor.4"[6163] [ 2170.117186][ T6162] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2170.293376][ T6167] device vlan845 entered promiscuous mode [ 2170.311131][ T6172] device veth1727 entered promiscuous mode [ 2170.335107][ T6167] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:05 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000001) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000100001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$update(0x2, 0x0, &(0x7f00000000c0)='\x00', 0x1) 14:42:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 14:42:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$update(0x2, 0x0, &(0x7f00000000c0)='\x00', 0x1) 14:42:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f597", 0x3a}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000110001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2170.602029][ T6189] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:06 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f00000005c0)=[{{0x0, 0x0, &(0x7f0000002640)=[{&(0x7f0000003180)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 14:42:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000120001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2170.794610][ T6194] device vlan846 entered promiscuous mode [ 2170.833586][ T6200] device veth1729 entered promiscuous mode 14:42:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f597", 0x3a}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="44000000a3f100a41c6a1c0bd572481d7b2a30151c540a2a46f806fdac00b23a32d1293629e957150e4c2a67f219cea94d924389bb1eb581266ced8bd3fc7a23e259a6af7f987a8929cfa380c364734e1942bbf6a0f3797da561e53af6f6ea577f46e4e9a8e960ebe789cc22803a79c73f387f9f249664a08a456734549ac351ac16e0df61284a7e8f7a3a7fca321d367caeea50b98e6ac9507c0e6338521e8ced82b057c9826935776189571c5fc4b7adc8186f9e9c85e149b7fb08cab11079ff01000000000000000052dcd4bf9ded12a6abab5ad2a15d4de582355c4686e675d2c51ceec768db03a9d1f55b9b9ee600"/267, @ANYRES16=r1, @ANYBLOB="170900000000000000000100000005000700000000000800090000000000060002000100000008000a000000000008001800ffffffff08001900ac141400"], 0x44}}, 0x0) 14:42:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff01, 0x1}, 0x1040, 0x0, 0x0, 0x8, 0x9, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 14:42:06 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000001) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 14:42:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000006120001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f597", 0x3a}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000014c0)="12cb", 0x2) bind(r1, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x38, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x40}, @NBD_ATTR_SERVER_FLAGS={0xc}]}, 0x38}, 0x1, 0x0, 0x0, 0x5}, 0x80) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x90, r2, 0x400, 0x70bd27, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x100000001}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8000}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r4}, {0x8, 0x1, r6}, {0x8, 0x1, r8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x80}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000081}, 0x4044804) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="44cd00cf97ce", @ANYRES16=r9, @ANYBLOB="1709000000000000000001000000050007000000000008000900000000000600028a5135fb0008000a000000000008001800ffffffff08001900ac141400"], 0x44}}, 0x0) 14:42:06 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000280)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_off='index=off'}]}) 14:42:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000130001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55", 0x57}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2171.645375][ T6233] device vlan847 entered promiscuous mode [ 2171.655458][ T6228] device veth1731 entered promiscuous mode 14:42:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 14:42:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x95}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) 14:42:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000000000003f0001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55", 0x57}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:07 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2008002) sendfile(r0, r1, 0x0, 0x200069) sendfile(r1, r1, 0x0, 0x200069) lchown(&(0x7f0000001180)='./bus\x00', 0x0, 0x0) [ 2172.076031][ T6256] device vlan848 entered promiscuous mode [ 2172.102422][ T6258] device veth1733 entered promiscuous mode [ 2172.143956][ T6256] __nla_validate_parse: 4 callbacks suppressed [ 2172.143967][ T6256] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000000000214e0001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xff61}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) 14:42:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 14:42:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55", 0x57}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2172.478953][ T6275] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a", 0x65}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:07 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400002, 0x0) ioctl$USBDEVFS_CONNECTINFO(r0, 0x40085511, &(0x7f00000000c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$GIO_FONTX(r4, 0x4b6b, &(0x7f0000000100)={0x1f1, 0x8, &(0x7f00000003c0)}) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r5, 0x54a2) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r6, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 14:42:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000600001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2172.735771][ T6282] device vlan849 entered promiscuous mode [ 2172.785829][ T6285] device veth1735 entered promiscuous mode 14:42:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a", 0x65}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2172.844693][ T6282] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2172.874844][ T28] audit: type=1800 audit(1595342528.233:488): pid=6283 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16995 res=0 14:42:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000000000001d630001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:08 executing program 4: r0 = socket$inet(0x2, 0x3, 0x800000800000001) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000280)="9303", 0x2) 14:42:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) [ 2173.111166][ T6307] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2173.287506][ T6312] device vlan850 entered promiscuous mode [ 2173.304032][ T6315] device veth1737 entered promiscuous mode 14:42:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a", 0x65}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendto(r0, &(0x7f0000000080)="714592829cb3db565447d6884f70bf34df08b60c429359574c2a21027796931af3e90cdf651f3265f13889799af66cd176514369d32505661339defb395eaf88e61d6cd13add677c0840928fcc3d5a6c95bc886c77a480c7079a25fe4285deb3592317de1434b355106ff636d52efc885bc1683efac800c2dd56558155e5341d21f15f9ddafb0fc83b5025da792becdc3d51a4f28dea492b8eebf1eae8d2c5c400d7ed8b47e94e561ce579af7da1b84f47a6ec49e1", 0xb5, 0x44000, &(0x7f0000000180)=@in={0x2, 0x4e21, @broadcast}, 0x80) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) 14:42:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000ffffff9e0001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x24, r5, 0xf, 0x0, 0x0, {0xf, 0x0, 0xf000}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x24}}, 0x0) [ 2173.353060][ T6312] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 14:42:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000fffffff00001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) eventfd2(0x1, 0x80000) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') bind$l2tp6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x1, @local, 0x8, 0x2}, 0x20) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r3, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40080}, 0x10) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCGETX(r5, 0x5432, &(0x7f0000000300)) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) 14:42:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a", 0x6c}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:08 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='cgroup\x00', 0x0, &(0x7f0000000140)='\x00') [ 2173.628340][ T6338] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a", 0x6c}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000007fffffff0001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x12) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@newqdisc={0x24, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) [ 2173.836123][ T6344] device vlan851 entered promiscuous mode [ 2173.848994][ T6346] device veth1739 entered promiscuous mode [ 2173.888093][ T6344] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a", 0x6c}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$NBD_DO_IT(r3, 0xab03) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}]}, 0x44}}, 0x0) 14:42:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000ffffffff0001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) 14:42:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6erspan={{0x14, 0x1, 'ip6erspan\x00'}, {0x8, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x3c}}, 0x0) [ 2174.400111][ T6368] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) dup(r0) 14:42:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5b", 0x70}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000f0ffffffffffff0001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, 0x0, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) [ 2174.570183][ T6375] device vlan852 entered promiscuous mode [ 2174.596966][ T6378] device veth1741 entered promiscuous mode [ 2174.629894][ T6375] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x34, r2, 0x905, 0x0, 0x0, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1a000510}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x88, r2, 0x300, 0x70bd26, 0x25dfdbfc, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}]}, 0x88}, 0x1, 0x0, 0x0, 0xc800}, 0x1000c811) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x44, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty=0xffffffff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x78) 14:42:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 14:42:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5b", 0x70}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000020000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2175.500916][ T6393] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:42:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5b", 0x70}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000030000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2175.580415][ T6393] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2175.606401][ T6393] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:42:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd2", 0x72}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000040000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2175.919922][ T6399] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, 0x0, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) [ 2176.078817][ T6400] device vlan853 entered promiscuous mode [ 2176.131622][ T6402] device veth1743 entered promiscuous mode 14:42:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000017d224dfa73d071577bd94db024245c48467aae6f712c55aff9d08000000d73857dca1822a3aa73970bce3d999ec20b53b2217934a7011027bf0788c8f72f97b5d94c6bca656701cb64fa555d3d95c86c0b9f8525493bb8f801e1a77a518e99bfeb1c30b539d40dbebb4d9db6d4939eec2ab42925fe3832d926928e229c03a82c14996264996929635c915eaaa2b470000000000000000", @ANYRES16=r1, @ANYBLOB="170900000000000000000100000005000700000000000800090000000000060002000100000008000a000000000008001800ffffffff08001900ac141400"], 0x44}}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000080)=0xffff, 0x4) 14:42:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) 14:42:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000050000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd2", 0x72}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000060000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd2", 0x72}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2176.934568][ T6437] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2176.947272][ T6437] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2176.955795][ T6437] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:42:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000080000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000009000/0x3000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0, r2}, 0x68) 14:42:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @local, 0x7800}}) [ 2177.277668][ T6452] device vlan854 entered promiscuous mode [ 2177.325550][ T6454] device veth1745 entered promiscuous mode [ 2177.387314][ T6454] __nla_validate_parse: 2 callbacks suppressed [ 2177.387324][ T6454] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 14:42:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000090000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff01, 0x1}, 0x1040, 0x0, 0x20, 0x8, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ptrace$cont(0x7, r0, 0x1000, 0x0) mq_notify(0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000280), 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x1bdd307, 0x2d000000) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x400c4}, 0x1) 14:42:12 executing program 4: r0 = socket(0x11, 0x800000003, 0x81) bind(r0, &(0x7f00000000c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000016012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c954"}, 0x80) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:42:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000a0000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2177.666981][ T6495] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {0x16}}, 0x14}}, 0x0) 14:42:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000b0000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0xc0542) ioctl$BLKDISCARD(r0, 0x1277, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=@md0='/dev/md0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x68000000, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x8) r1 = socket(0x11, 0x800000003, 0x81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000cab000)=0xffffffa2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="94000000ed03000325bd70005b1a7810eebe3af60d481c6cdeeaaf7ef454dd92af794fa983f8e9d90a2d48d8321bc95c9d71d0772f56841f408fcdc62ad925475cfa479db82a69bc2fe109e0c59789c52096a57766a5e444bcc04679c108166d850da5e81e4199b74be755c8c7fbcdfba4d0e1d0101c39cd96543510508f85511facfaad0000000000000000a2a4000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x15}, 0x40040) 14:42:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2178.043864][ T6499] device vlan855 entered promiscuous mode [ 2178.077239][ T6507] device veth1747 entered promiscuous mode [ 2178.114874][ T6499] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xc000000}, 0x0) 14:42:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {0x0}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000e0000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2178.426980][ T6545] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2178.551358][ T6546] device vlan856 entered promiscuous mode [ 2178.568713][ T6550] device veth1749 entered promiscuous mode [ 2178.593146][ T6546] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:16 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b80)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c61612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669ffa4aaca0f9d9924be41a9169bdfaf16d1c0b153911b8dd79165789c623c19a39050009539fca4e0b6ec015a7d55555a34effa077faa55c59e88254f54077c668f799bf1683537a8ea024d8b8cc5a5e3d77ac463920e231b7ae0da8616d2b7958f91f5d822175ed60ab386d94af98af00a2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494da484ebad0407d9440b69ad9f19ab8b4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd5b09012175484135f0e519f417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aa87e94d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed564c0a2fcb6da006b5d0fe4886a9edee77cb986319f85dd06a24c37e588959f34d2c5f649b85e5b0baada5f1aad49da960f10ddd86e2d1638f000000008526a13702d613dc88670f3478182136c74d163716ba8219392d65582b33e7dfd27e69d71a16f2c3e683176d47c2599dfd2bc75476f903008c05c8ce9edd1ef5cc236934ac483b8bf80794ecb7ac85ce453c14d29dab6dcf1855a1ab3d7c2ee8d43e479f3a17a4ac213bfa477f3da41564aac25192cb10e4e4dfc5cfbdef1d4cea17286ec8f6db40ef62b8ca086734223cf718c6bb21eae7eca3cb1baa3105a33cfc2cd919df3720d13cd114695fea0cd05735a16d3c4e101ac6713c630445402b02e35e48f049b44631062d465506ceec6947c78fd2bb24c288d719668a712d529d9d0ba7b0db4cca204c6fae33f60c01559eafbed82203bf45781e3681c0c3bd1c18a402a93e156bcf4a4043bf4d2ee7575a977b0e0a76647f949edd8e86b58702e5edc98405db78242b542ab94182db71a0d5a0354ceb4399aa25ecfed552652f93f6215bbfeb4d355a924031313183bef1725570b155341774ec5d59e9047f452c1d18c915bc099fdcd0761c9a10c22419c03ae7200cbb79a2bd3c9106ac0d56768ea2194ec9a761898b37e170a179f3f93f099c0d47c614ae59e763c069bc1287cd6f87206490b274b8593a58a5f40e69aab3f0d268b8e1704051f48254202fbae2b37c6a02960c73b645070000000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 14:42:16 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000000c0)={0x0, 0x0, 0x2, 0x0, 0x3daa, 0x3a1d}) 14:42:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000f0000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {0x0}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) [ 2181.057123][ T6567] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:16 executing program 4: keyctl$get_persistent(0x5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000100)) 14:42:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000100000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {0x0}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2181.306505][ T6573] device vlan857 entered promiscuous mode 14:42:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x80fe) 14:42:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000110000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2181.353286][ T6576] device veth1751 entered promiscuous mode [ 2181.391262][ T6573] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:17 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) 14:42:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) [ 2181.726384][ T6602] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2181.813649][ T6604] fuse: Bad value for 'fd' [ 2181.870931][ T6605] device vlan858 entered promiscuous mode [ 2181.876369][ T6614] fuse: Bad value for 'fd' [ 2181.889615][ T28] audit: type=1800 audit(1595342537.244:489): pid=6574 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17459 res=0 [ 2181.913218][ T6606] device veth1753 entered promiscuous mode 14:42:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000120000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:17 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x1}) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/196, 0x1}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:42:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:17 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0xff, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000001700)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000)="88", 0x1}]) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r3, r1, 0x8, 0x0) vmsplice(r4, &(0x7f0000000040)=[{&(0x7f00000000c0)="06", 0x1}], 0x1, 0x0) [ 2181.945826][ T6605] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 14:42:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000130000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2182.195870][ T6627] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000600000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2182.413374][ T6630] device vlan859 entered promiscuous mode 14:42:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48", 0x47}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:17 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'batadv0\x00', &(0x7f0000000100)=@ethtool_gstrings={0x1d}}) [ 2182.466914][ T6635] device veth1755 entered promiscuous mode [ 2182.511264][ T6630] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:17 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000f00000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 14:42:18 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48", 0x47}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x4}]}, 0x1c}}, 0x0) [ 2183.166375][ T28] audit: type=1804 audit(1595342538.514:490): pid=6649 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16938 res=1 14:42:18 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000300000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2183.310866][ T6672] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48", 0x47}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:18 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 2183.457811][ T6675] device vlan860 entered promiscuous mode [ 2183.494698][ T6679] device veth1757 entered promiscuous mode 14:42:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000500000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2183.535468][ T6675] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:19 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 2184.553898][ T6691] fuse: Bad value for 'fd' [ 2184.617999][ T28] audit: type=1804 audit(1595342539.964:491): pid=6702 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16943 res=1 14:42:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 14:42:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6", 0x6a}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000600000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:20 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 2184.797869][ T6709] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:20 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6", 0x6a}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000120600000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:20 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 2185.017226][ T6715] device vlan861 entered promiscuous mode [ 2185.057419][ T6716] device veth1759 entered promiscuous mode [ 2185.334022][ T6715] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2185.995722][ T28] audit: type=1804 audit(1595342541.344:492): pid=6743 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16943 res=1 [ 2186.430680][ T6691] fuse: Bad value for 'fd' 14:42:22 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x11, 0x800000003, 0x0) close(r0) 14:42:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000900000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6", 0x6a}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 14:42:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2186.755901][ T6752] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a83", 0x7c}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000a00000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 2186.956951][ T6758] device vlan862 entered promiscuous mode [ 2186.989647][ T6761] device veth1761 entered promiscuous mode [ 2187.017684][ T6758] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a83", 0x7c}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x48000000}, 0x0) 14:42:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000b00000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:22 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x1345, 0x3008, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) syz_usb_disconnect(0xffffffffffffffff) r1 = syz_usb_connect(0x0, 0x24, &(0x7f0000000380)=ANY=[], 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000280)={0x2c, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000ef00"], 0x0, 0x0, 0x0, 0x0}, 0x0) 14:42:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a83", 0x7c}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2187.356995][ T6786] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000e00000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd885067395", 0x85}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2187.595944][ T28] audit: type=1804 audit(1595342542.945:493): pid=6762 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=18065 res=1 [ 2187.612153][ T6790] device vlan863 entered promiscuous mode 14:42:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:23 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 2187.693666][ T6791] device veth1763 entered promiscuous mode 14:42:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000f00000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2187.745216][ T6790] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd885067395", 0x85}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x4c000000}, 0x0) 14:42:23 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000001100000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2188.072954][ T6820] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2188.111686][ T28] audit: type=1804 audit(1595342543.465:494): pid=6823 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16698 res=1 [ 2188.302140][ T6830] device vlan864 entered promiscuous mode [ 2188.335953][ T6833] device veth1765 entered promiscuous mode [ 2188.356670][ T6830] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:23 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/udp\x00') keyctl$get_persistent(0x5, 0x0, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = socket(0xa, 0x5, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r1}, @IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x40}}, 0x0) 14:42:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd885067395", 0x85}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000001200000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:23 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) [ 2188.612876][ T6854] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2188.831019][ T6859] device vlan865 entered promiscuous mode [ 2188.879020][ T6860] device veth1767 entered promiscuous mode 14:42:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000061200000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:24 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81", 0x89}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000001300000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81", 0x89}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2189.462083][ T6858] device batadv0 entered promiscuous mode [ 2189.510669][ T6858] device batadv0 left promiscuous mode [ 2189.597317][ T6868] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:25 executing program 1: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/udp\x00') keyctl$get_persistent(0x5, 0x0, 0x0) lstat(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/config\x00') r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = socket(0xa, 0x5, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r1}, @IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x40}}, 0x0) 14:42:25 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x65580000}, 0x0) 14:42:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000631d00000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:25 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81", 0x89}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:25 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) [ 2189.916128][ T6905] device batadv0 entered promiscuous mode 14:42:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000004e2100000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2189.990437][ T6905] device batadv0 left promiscuous mode 14:42:25 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) 14:42:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09a", 0x8b}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2190.119210][ T6910] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2190.296549][ T6916] device vlan866 entered promiscuous mode [ 2190.317046][ T6918] device veth1769 entered promiscuous mode [ 2190.342255][ T6916] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000003f00000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2190.416917][ T6938] device batadv0 entered promiscuous mode [ 2190.492854][ T6938] device batadv0 left promiscuous mode 14:42:26 executing program 1: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2112008dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"/1468], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) r0 = gettid() tkill(r0, 0x27) 14:42:26 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) 14:42:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09a", 0x8b}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000214e00000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x68000000}, 0x0) 14:42:26 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x258, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0xc8, 0x130, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b8) [ 2190.776245][ T6958] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000006000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09a", 0x8b}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:26 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x258, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0xc8, 0x130, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b8) 14:42:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000001d6300000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2191.141653][ T6964] device vlan867 entered promiscuous mode [ 2191.199333][ T6967] device veth1771 entered promiscuous mode [ 2191.251980][ T6964] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:26 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x258, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0xc8, 0x130, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b8) 14:42:27 executing program 1: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2112008dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"/1468], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) r0 = gettid() tkill(r0, 0x27) 14:42:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf", 0x8c}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x6c000000}, 0x0) 14:42:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000f000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:27 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x430, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2a0, 0x308, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) [ 2191.704146][ T28] audit: type=1804 audit(1595342547.055:495): pid=6996 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16972 res=1 14:42:27 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x430, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2a0, 0x308, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) [ 2191.879485][ T7008] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000004003000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf", 0x8c}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:27 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x430, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2a0, 0x308, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) [ 2192.186612][ T7012] device vlan868 entered promiscuous mode [ 2192.256267][ T7014] device veth1773 entered promiscuous mode 14:42:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf", 0x8c}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000340000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:28 executing program 1: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2112008dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"/1468], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) r0 = gettid() tkill(r0, 0x27) 14:42:28 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x74000000}, 0x0) 14:42:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000fffff0000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:28 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 2192.797462][ T7042] xt_hashlimit: overflow, try lower: 0/0 14:42:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2192.879830][ T7047] __nla_validate_parse: 1 callbacks suppressed [ 2192.879839][ T7047] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:28 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000010000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2192.991535][ T7054] xt_hashlimit: overflow, try lower: 0/0 [ 2193.235792][ T7052] device vlan869 entered promiscuous mode 14:42:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2193.324967][ T7056] device veth1775 entered promiscuous mode [ 2193.350469][ T7073] xt_hashlimit: overflow, try lower: 0/0 [ 2193.409266][ T7052] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:28 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 2193.747027][ T28] audit: type=1804 audit(1595342549.075:496): pid=7081 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=18273 res=1 14:42:29 executing program 1: clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:42:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x7a000000}, 0x0) 14:42:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000020000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:29 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:29 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000030000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:29 executing program 1: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2112008dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"/1468], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) r0 = gettid() tkill(r0, 0x27) [ 2194.038624][ T7093] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {0x0}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:29 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 2194.274983][ T7097] device vlan870 entered promiscuous mode [ 2194.310547][ T7101] device veth1777 entered promiscuous mode [ 2194.347521][ T7097] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000040000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:29 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) 14:42:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {0x0}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:30 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0xe000, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 14:42:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000050000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2194.773831][ T28] audit: type=1804 audit(1595342550.125:497): pid=7130 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=18465 res=1 [ 2194.781476][ T7132] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:30 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x0, 0xffffffff}) 14:42:30 executing program 1: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2112008dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"/1468], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) r0 = gettid() tkill(r0, 0x27) 14:42:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {0x0}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2195.075524][ T7133] device vlan871 entered promiscuous mode 14:42:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000060000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2195.130255][ T7136] device veth1779 entered promiscuous mode [ 2195.159196][ T7133] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) 14:42:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000080000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:30 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x0) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 2195.539618][ T7163] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:31 executing program 1: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2112008dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"/1468], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) r0 = gettid() tkill(r0, 0x27) [ 2195.728943][ T7168] device vlan872 entered promiscuous mode 14:42:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000090000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2195.770653][ T7170] device veth1781 entered promiscuous mode [ 2195.785060][ T7163] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:31 executing program 4: 14:42:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 14:42:31 executing program 4: 14:42:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000000a0000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2196.197086][ T7196] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2196.393488][ T7198] device vlan873 entered promiscuous mode [ 2196.419680][ T7202] device veth1783 entered promiscuous mode [ 2196.441989][ T7198] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:31 executing program 4: 14:42:31 executing program 1: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2112008dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b70200000b400000bfa300000000000024020000fffeffff7a03f0fff8e2ffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff07cd02000404000001007d60b7030000001000106a0a00fe000000008500000026000000b70600000000004295000000000000001da5ad3548ebb63d18db6a1c72821c9b767acc308fbcd5c5e4a5ad1065b572c2c9ff2d5ac60c2ceaea4c1dc908abb6e7325ec1956b01660bf36628dff1a15750ab9a577914780001000000000000d4bf814f01f2cd519e078d4ffab418e4682b2aec5e4a356220b67f4182f32333b08c6e497687e10a35aea5cac0ceafdb9a2eeb02a0f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b783ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0c330a5bb8c13d5b47975b4b13b9f35e4f41a8566fa3488d8c1af439166848b419f95489ee53da177e537460ca46abba8652c1df2a44b027dd571b70287a75bb32935f542127a8f8438feecbb1c757f7169f006f3f565b6fbfbd0b14b3625962905ef911785c88a6084d676d8ef8a6d64a2363682e5d067e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f655767972f51d4be254333af9a9d91c3e41ac37a63f85ad8f32b70a80ceaf6c6ed2786f6af696ace69dfa299cff6983d6155db119e1adc4b153c989ef100bbf76063e1c443b0b73d70e9c3d7b90aecf4b512200000002406333c890923a797e00b75481739ce1fea3f6ac0d7025759d4b45577c205c70631e8ad585951950e521f4e210b6494e30000000000000000cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d933892378983919088383268324a25df14010c8ed60000000044a99e697c09989a47d2cc711aee517a38b104c0982292213bd9b9545f66fd2e7268c8f984164617976092dc5a2ee0280e0ad81db3522f5b42fdff008532b59e51243afeb553d7f39ce6dbb74e8cd2f2e1b122c30b14214a3f4b82550761638d21b06991a6491df997df2f3e8ca9d4a5102abdb4e251081aea9d3632601042959e63cf1ca2ce6e3276a8bfbea9e37c82277aaa4f0b09f60b1047cc41758bbc957a338d5355fbdf41615ce044dfbc71c7b1526e44c88a76bb0b6c072fed3cc4d34310f988a90fe5bc6b7aeb6e90c5bcf9c6d8b66172aaff5a1347c8d8000000000000000000009daa19ab24b2871a88da33e552db58892ed9ac0a0db4a8fddb8a6ca03835bf8cf380f7334f8c665b6007001e15a936325f8aabe51f2d1c6d7c8c29c4416f348016246ff2e22ba3e54f03b10d32e3d6daf2d068e75af752ff63947e008bcfb542bad7b64b4862ddb5740194fa36acc84eb4a18438f980b59d08f32104000000a51458981305682e2693fa840e84bc00898c8be200000000c6857012bd04e39f70060000ab95000800003029126ab9bc883b10d561d24e88aaf90f02763be4d80566f8136e7deb89de7cd8aa502440c807000c75937af5f06637df4ba2d4c173cd8bd74498a0d885bc684dbb5699cfb8cf806716c433d6d58e2abd721f8c96724f0d9c323c084ef3b3336f718c18009df59c158d6af663ced6e88811efc5ead0ffd3ae2992091e814d96d8ef8540768f0000008f6923208f4cf2dc0900000083680ccf559a887d8cb1ff64d9bb92c2f4158fad9600740ecb3d94bb12aeb21fe823f7dc319a87a19e982a49d5b517cbc09f65778a042c4856f8957b826678a73195db24054d026db14d1cb6b20000000000000000003088d4b65eedddd91c453deae36fae6782bbcc26f2500ed38c1c97e916766aa49143990fb327c72d9b97a36fe97ca4c6f4f1748da5cbbc46c68100000000000066566a6e84f21e8fe3706183af6bfc36384c03000000000000004fa95ff8eb23c16144a5224d092fbac3eb2b40000000000000000000000000005d65a7934fc474d892b8a6ff4e0a59bc24ab8b56de9fd82a8b93cf5e3e4cb9fec6acda3027c6de609933c87800"/1468], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) r0 = gettid() tkill(r0, 0x27) 14:42:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000000b0000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6", 0x49}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xc3ffffff}, 0x0) 14:42:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6", 0x49}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:32 executing program 4: 14:42:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000000e0000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2196.923649][ T7224] device vlan874 entered promiscuous mode [ 2196.946431][ T28] audit: type=1804 audit(1595342552.295:498): pid=7236 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16927 res=1 [ 2196.971391][ T7228] device veth1785 entered promiscuous mode 14:42:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xe3408bf0}, 0x0) 14:42:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000000f0000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:32 executing program 1: [ 2197.534529][ T7245] device vlan875 entered promiscuous mode [ 2197.551468][ T7247] device veth1787 entered promiscuous mode 14:42:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:33 executing program 4: 14:42:33 executing program 1: 14:42:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6", 0x49}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000100000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xf08b40e3}, 0x0) 14:42:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000110000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:33 executing program 4: 14:42:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b0373241", 0x6e}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:33 executing program 1: [ 2197.950455][ T28] audit: type=1804 audit(1595342553.305:499): pid=7264 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16934 res=1 14:42:33 executing program 4: 14:42:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000120000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2198.083626][ T7270] device vlan876 entered promiscuous mode [ 2198.132642][ T7274] device veth1789 entered promiscuous mode [ 2198.171156][ T7270] __nla_validate_parse: 5 callbacks suppressed [ 2198.171165][ T7270] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:34 executing program 1: 14:42:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b0373241", 0x6e}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 14:42:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000006120000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:34 executing program 4: 14:42:34 executing program 1: 14:42:34 executing program 4: [ 2198.818970][ T7297] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000130000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b0373241", 0x6e}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2198.972382][ T28] audit: type=1804 audit(1595342554.325:500): pid=7305 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17021 res=1 14:42:34 executing program 1: 14:42:34 executing program 4: [ 2199.194791][ T7300] device vlan877 entered promiscuous mode [ 2199.234906][ T7303] device veth1791 entered promiscuous mode [ 2199.284256][ T7300] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000003f0000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a", 0x80}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:35 executing program 4: 14:42:35 executing program 1: 14:42:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) 14:42:35 executing program 1: [ 2199.846800][ T7327] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:35 executing program 4: 14:42:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a", 0x80}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2199.986466][ T28] audit: type=1804 audit(1595342555.336:501): pid=7335 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16974 res=1 14:42:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000214e0000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:35 executing program 1: 14:42:35 executing program 4: [ 2200.153363][ T7332] device vlan878 entered promiscuous mode [ 2200.190179][ T7334] device veth1793 entered promiscuous mode [ 2200.236224][ T7332] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:36 executing program 1: 14:42:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a", 0x80}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000600000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xfeffffff}, 0x0) 14:42:36 executing program 4: 14:42:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57", 0x89}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000001d630000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:36 executing program 4: 14:42:36 executing program 1: [ 2200.926368][ T7360] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2200.994655][ T28] audit: type=1804 audit(1595342556.346:502): pid=7361 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17007 res=1 14:42:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57", 0x89}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:36 executing program 1: [ 2201.280385][ T7362] device vlan879 entered promiscuous mode [ 2201.322688][ T7366] device veth1795 entered promiscuous mode [ 2201.391464][ T7362] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:37 executing program 4: 14:42:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000ffffff9e0000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:37 executing program 1: 14:42:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xffffa888}, 0x0) 14:42:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57", 0x89}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:37 executing program 1: [ 2201.880431][ T7386] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:37 executing program 4: 14:42:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54", 0x8e}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000fffffff00000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2202.044716][ T28] audit: type=1804 audit(1595342557.396:503): pid=7397 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17007 res=1 [ 2202.161520][ T7390] device vlan880 entered promiscuous mode 14:42:37 executing program 1: 14:42:37 executing program 4: [ 2202.202847][ T7392] device veth1797 entered promiscuous mode [ 2202.241266][ T7390] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000f0ffff0000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 14:42:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54", 0x8e}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:38 executing program 1: 14:42:38 executing program 4: [ 2202.859190][ T7415] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:38 executing program 4: 14:42:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54", 0x8e}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:38 executing program 1: 14:42:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000007fffffff0000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2203.020043][ T28] audit: type=1804 audit(1595342558.376:504): pid=7423 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16665 res=1 14:42:38 executing program 1: 14:42:38 executing program 4: [ 2203.176777][ T7419] device vlan881 entered promiscuous mode [ 2203.212277][ T7421] device veth1799 entered promiscuous mode [ 2203.274201][ T7419] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e730", 0x90}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000009effffff0000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:39 executing program 4: 14:42:39 executing program 1: 14:42:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 14:42:39 executing program 4: 14:42:39 executing program 1: [ 2203.843856][ T7448] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000f0ffffff0000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e730", 0x90}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2203.984685][ T28] audit: type=1804 audit(1595342559.336:505): pid=7458 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17143 res=1 14:42:39 executing program 1: 14:42:39 executing program 4: [ 2204.095224][ T7454] device vlan882 entered promiscuous mode [ 2204.161364][ T7456] device veth1801 entered promiscuous mode [ 2204.209965][ T7454] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000003400001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e730", 0x90}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:40 executing program 1: 14:42:40 executing program 4: 14:42:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 14:42:40 executing program 4: [ 2204.820583][ T7479] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:40 executing program 1: 14:42:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e73008", 0x91}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000fffffffffffff00001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2204.968632][ T28] audit: type=1804 audit(1595342560.326:506): pid=7487 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17538 res=1 14:42:40 executing program 1: 14:42:40 executing program 4: [ 2205.113792][ T7484] device vlan883 entered promiscuous mode [ 2205.169144][ T7485] device veth1803 entered promiscuous mode [ 2205.228559][ T7484] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000000101050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e73008", 0x91}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:41 executing program 1: 14:42:41 executing program 4: 14:42:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xffffffc3}, 0x0) [ 2205.792543][ T7508] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:41 executing program 1: 14:42:41 executing program 4: 14:42:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e73008", 0x91}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000000201050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:41 executing program 4: [ 2205.997528][ T28] audit: type=1804 audit(1595342561.346:507): pid=7521 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17572 res=1 [ 2206.035577][ T7515] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2206.048061][ T7514] device vlan884 entered promiscuous mode [ 2206.074974][ T7516] device veth1805 entered promiscuous mode 14:42:41 executing program 1: [ 2206.101168][ T7514] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000000301050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:41 executing program 4: 14:42:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 14:42:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:41 executing program 1: [ 2206.420287][ T7540] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:41 executing program 4: 14:42:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000000401050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:41 executing program 1: 14:42:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2206.584592][ T28] audit: type=1804 audit(1595342561.936:508): pid=7550 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17523 res=1 [ 2206.593411][ T7545] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 14:42:42 executing program 4: 14:42:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000000501050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:42 executing program 1: [ 2206.761536][ T7544] device vlan885 entered promiscuous mode 14:42:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2206.824416][ T7546] device veth1807 entered promiscuous mode 14:42:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xfffffffc}, 0x0) 14:42:42 executing program 4: 14:42:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:42 executing program 1: 14:42:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000000601050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:42 executing program 4: 14:42:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {0x0}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') r4 = dup(r2) sendfile(r4, r3, 0x0, 0x523) [ 2207.255249][ T28] audit: type=1804 audit(1595342562.606:509): pid=7584 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17762 res=1 14:42:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000000801050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="25bca274769e620a27340500000000000000b86a5488fda802000000000000004e2f98b579a782d257146d0e0206e73ba8f4952bedc6760253ef9eef00d659f58cd3daab38ff59c27b777ea82caee61956f3cd659ca014c78b51c4f9f07c6e3781175b154f14", 0x66, 0x400}], 0x0, &(0x7f0000000180)) [ 2207.303714][ T7579] device vlan886 entered promiscuous mode [ 2207.332066][ T7581] device veth1809 entered promiscuous mode 14:42:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) 14:42:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {0x0}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x3, 0x0, [{0x0, 0x0, 0x1, 0x0, 0x100}, {0x0, 0xfff, 0x0, 0x2}, {}]}) socket$alg(0x26, 0x5, 0x0) 14:42:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup3(r2, r0, 0x0) read$char_usb(r3, &(0x7f0000000080)=""/188, 0xf9) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000001c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x2c, 0x3, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0x4}, [@CTA_ZONE={0x6}, @CTA_NAT_SRC={0x4}, @CTA_TUPLE_MASTER={0xc, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000085}, 0x60000000) [ 2207.705043][ T7608] device vlan887 entered promiscuous mode [ 2207.748433][ T7614] device veth1811 entered promiscuous mode 14:42:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000000901050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:43 executing program 1: 14:42:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {0x0}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:43 executing program 4: 14:42:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 14:42:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="25bca274769e620a27340500000000000000b86a5488fda802000000000000004e2f98b579a782d257146d0e0206e73ba8f4952bedc6760253ef9eef00d659f58cd3daab38ff59c27b777ea82caee61956f3cd659ca014c78b51c4f9f07c6e3781175b154f14", 0x66, 0x400}], 0x0, &(0x7f0000000180)) 14:42:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000000a01050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f00000008c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000880)={&(0x7f0000000300)=ANY=[@ANYRES16=0x0, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="0500370021009b0459339e0ab3ce90e79728fa6e6f3cf9cc4544e46dece8fdd8241dd21bb311cf96da5eae54ffd31d9b7c57387922df52b22f93eadb"], 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:42:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000003500)=[{&(0x7f0000000140)=""/125, 0x7d}], 0x1, 0x100000001) [ 2208.293340][ T7629] device vlan888 entered promiscuous mode [ 2208.321061][ T28] audit: type=1804 audit(1595342563.676:510): pid=7643 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17601 res=1 14:42:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000000b01050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2208.339639][ T7635] device veth1813 entered promiscuous mode [ 2208.372429][ T7634] __nla_validate_parse: 6 callbacks suppressed [ 2208.372439][ T7634] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2208.376133][ T7629] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:44 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x3, 0x0) write$tun(r1, &(0x7f00000000c0)=ANY=[@ANYRES64=r4], 0xd) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 14:42:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000000e01050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x2) 14:42:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d257146d0e0206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000002c0)={[{@nolazytime='nolazytime'}]}) 14:42:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000240)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f00000001c0)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x16) [ 2209.302678][ T7667] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2209.370074][ T28] audit: type=1804 audit(1595342564.726:511): pid=7673 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17891 res=1 14:42:44 executing program 4: syz_open_procfs(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/dev_mcast\x00') r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfb]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000340)=ANY=[@ANYBLOB="f7f1cb"]) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000300)={'nat\x00', 0x2, [{}, {}]}, 0x48) 14:42:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000000f01050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2209.474664][ T7672] device vlan889 entered promiscuous mode [ 2209.521514][ T7675] device veth1815 entered promiscuous mode [ 2209.552378][ T7672] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070339c518cd3a5dffcfe60b582f59a300000000000000003a72e49010bbda244b4148b7ac78a4cee2db9d8ff4c8cf8676f6f04d945002ddab6c92d42cc438bf16b7e955aa2bc24600883de6d35072fdb968870c208e182be8c3f7e1258f23b5b424af2e710d860ec28ad4f14df18e88faf380d214f51f30e0c877b77f5aff03166f1c480d8f1464e69d79c3f765e420eb8341ee61cf05ba2df0613e6166680f63effb83f0b6a60f386752571522c7633b29a829628bd3db764919c0c7c4e597d275f88bb60963da7e457a5aed6134d26b02e40eec507c4e83f1", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:42:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x3) [ 2209.772636][ T7699] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2209.880939][ T7702] device vlan890 entered promiscuous mode [ 2209.900777][ T7702] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="25bca274769e0820000000000000612687ecb86a548802a902000000000000004e2f98b579a782d257146d0e0206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@data_ordered='data=ordered'}, {@nouser_xattr='nouser_xattr'}]}) 14:42:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce550", 0x1d}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000001001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x4) [ 2210.261204][ T7717] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:45 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc008ae88, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000000)) 14:42:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000001101050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce550", 0x1d}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2210.399705][ T28] audit: type=1804 audit(1595342565.756:512): pid=7720 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16699 res=1 [ 2210.424764][ T7720] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2210.482486][ T7721] device vlan891 entered promiscuous mode 14:42:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000047c0), 0x0, &(0x7f0000004840)=""/170, 0xaa}}], 0x2, 0x10042, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000100)="b805000000b94a0000000f01c10f00d4b93c0200000f320f0666b80a008ec00f09c4c125d5b370199ca9c7442400a4b9b4edc74424024ddf3ba1c7442406000000000f011c24b8010000000f01c1660f3881530f"}], 0x15555555555555d2, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:42:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000001201050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2210.524178][ T7723] device veth1819 entered promiscuous mode [ 2210.562002][ T7721] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:48 executing program 1: ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x8, 0x2b, 0x0, @dev, @local, {[], {0x0, 0x0, 0x8}}}}}}, 0x0) 14:42:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x5) 14:42:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce550", 0x1d}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000061201050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070339c518cd3a5dffcfe60b582f59a300000000000000003a72e49010bbda244b4148b7ac78a4cee2db9d8ff4c8cf8676f6f04d945002ddab6c92d42cc438bf16b7e955aa2bc24600883de6d35072fdb968870c208e182be8c3f7e1258f23b5b424af2e710d860ec28ad4f14df18e88faf380d214f51f30e0c877b77f5aff03166f1c480d8f1464e69d79c3f765e420eb8341ee61cf05ba2df0613e6166680f63effb", 0xa5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2212.811657][ T7755] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000001301050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2212.929184][ T28] audit: type=1804 audit(1595342568.287:513): pid=7772 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=18076 res=1 14:42:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a990850", 0x2c}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 2213.021285][ T7766] device vlan892 entered promiscuous mode 14:42:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x6) 14:42:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000003f01050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2213.378827][ T7790] device vlan893 entered promiscuous mode [ 2213.411196][ T7792] device veth1823 entered promiscuous mode [ 2213.450623][ T7790] __nla_validate_parse: 2 callbacks suppressed [ 2213.450631][ T7790] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a990850", 0x2c}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x7) [ 2213.908801][ T7809] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2213.991965][ T7810] device vlan894 entered promiscuous mode [ 2214.003780][ T7809] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000214e01050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x8) 14:42:49 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 2214.213535][ T7822] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2214.318991][ T7825] device vlan895 entered promiscuous mode [ 2214.366037][ T7822] device veth1827 entered promiscuous mode [ 2214.714948][ T7825] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:42:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a990850", 0x2c}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000006001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x9) 14:42:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:42:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000000000001d6301050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2215.910473][ T7848] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000000000ffffff9e01050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5c", 0x33}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2216.425518][ T28] audit: type=1804 audit(1595342571.777:514): pid=7865 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=18370 res=1 14:42:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000000000fffffff001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2216.501763][ T7853] device vlan896 entered promiscuous mode [ 2216.615641][ T7853] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e90005000100"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:42:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x810204) 14:42:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0xa) 14:42:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000007fffffff01050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:42:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5c", 0x33}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2217.094766][ T7894] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2217.339848][ T7898] device vlan897 entered promiscuous mode [ 2217.370047][ T7900] device veth1831 entered promiscuous mode 14:42:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5c", 0x33}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2217.408446][ T7898] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0xc) 14:42:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e90005000100"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:42:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee7", 0x37}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2217.779963][ T7913] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2218.053661][ T7915] device vlan898 entered promiscuous mode [ 2218.137824][ T28] audit: type=1804 audit(1595342573.497:515): pid=7922 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=18466 res=1 [ 2218.606495][ T7934] __nla_validate_parse: 1 callbacks suppressed [ 2218.606505][ T7934] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2218.845486][ T7936] device veth1835 entered promiscuous mode [ 2219.171799][ T7935] device vlan899 entered promiscuous mode [ 2219.201167][ T7935] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:42:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee7", 0x37}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee7", 0x37}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:42:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0xe) 14:43:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee79182", 0x39}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e90005000100"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:43:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0xf) 14:43:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000000000ffffffff01050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:05 executing program 4: sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="f1ff", @ANYBLOB="000000000000000000000f000000360002000800010000000000040004000800020000000000080002000000000008000100000000002c00070008000200000000000c000400000000000000000008000100000000000c00040009"], 0x3}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a2809302", 0xe}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) socket$key(0xf, 0x3, 0x2) [ 2230.108810][ T7958] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000f0ffffffffffff01050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2230.160065][ T28] audit: type=1804 audit(1595342585.518:516): pid=7963 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17119 res=1 14:43:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee79182", 0x39}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000000000400050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2230.354502][ T7964] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.4'. 14:43:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee79182", 0x39}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2230.493183][ T7965] device vlan900 entered promiscuous mode 14:43:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000200000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2230.878521][ T7965] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x10) 14:43:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:43:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000300000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:06 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r0 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf\x00\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) sysfs$2(0x2, 0x5, &(0x7f0000000180)=""/163) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) [ 2231.141075][ T8003] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2231.159486][ T28] audit: type=1804 audit(1595342586.518:517): pid=8004 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17101 res=1 14:43:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000400000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:06 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 2231.306621][ T8009] device vlan901 entered promiscuous mode [ 2231.319503][ T8012] device veth1839 entered promiscuous mode [ 2231.343686][ T8009] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x48) 14:43:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {0x0}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {0x0}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2232.091220][ T8030] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000500000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2232.283893][ T8033] device vlan902 entered promiscuous mode 14:43:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {0x0}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2232.351683][ T8040] device veth1841 entered promiscuous mode 14:43:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000600000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2232.403435][ T28] audit: type=1804 audit(1595342587.758:518): pid=8052 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17101 res=1 [ 2232.444104][ T8033] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:07 executing program 4: 14:43:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x4c) 14:43:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2232.618480][ T8063] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:08 executing program 4: 14:43:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000800000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000900000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000a00000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:43:08 executing program 4: [ 2233.632939][ T8069] device vlan903 entered promiscuous mode [ 2233.695729][ T8073] device veth1843 entered promiscuous mode [ 2233.738778][ T8088] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2233.850983][ T28] audit: type=1804 audit(1595342589.208:519): pid=8095 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16813 res=1 14:43:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000b00000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:09 executing program 4: 14:43:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x60) [ 2233.978171][ T8102] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:09 executing program 4: 14:43:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000e00000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:09 executing program 4: 14:43:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000f00000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2234.274386][ T8107] device vlan904 entered promiscuous mode [ 2234.314447][ T8110] device veth1845 entered promiscuous mode 14:43:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:43:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf", 0x2}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x68) 14:43:10 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 14:43:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000001000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf", 0x2}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2234.836751][ T28] audit: type=1804 audit(1595342590.198:520): pid=8137 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17155 res=1 14:43:10 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="550000001800fd0c00000000000081930a600000fca84302910000003900090020000c", 0x23}], 0x1}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 14:43:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf", 0x2}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000001100000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2235.820388][ T8149] device vlan905 entered promiscuous mode [ 2235.827900][ T8152] device veth1847 entered promiscuous mode 14:43:11 executing program 4: syz_usb_connect(0x5, 0x24, &(0x7f00000014c0)={{0x12, 0x1, 0x0, 0xbb, 0x49, 0xd0, 0x40, 0x4bb, 0x950, 0x542a, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0xff, 0xff}}]}}]}}, 0x0) [ 2235.937313][ T8172] __nla_validate_parse: 2 callbacks suppressed [ 2235.937323][ T8172] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x6c) 14:43:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000001200000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000001300000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2236.220456][ T8187] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {0x0}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2236.349187][ T28] audit: type=1804 audit(1595342591.708:521): pid=8198 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17426 res=1 14:43:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000006000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2236.472435][ T8193] device vlan906 entered promiscuous mode [ 2236.489720][ T8195] device veth1849 entered promiscuous mode 14:43:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {0x0}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2236.521004][ T8193] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000f000000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x74) [ 2236.790577][ T8220] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2236.927534][ T8221] device vlan907 entered promiscuous mode [ 2236.941936][ T8224] device veth1851 entered promiscuous mode [ 2236.972537][ T8221] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:43:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000003000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@ldst={0x5, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 14:43:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {0x0}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x7a) [ 2237.185662][ T8237] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000005000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2237.359102][ T28] audit: type=1804 audit(1595342592.718:522): pid=8249 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17119 res=1 14:43:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000006000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2237.580122][ T8242] device vlan908 entered promiscuous mode [ 2237.622154][ T8237] device veth1853 entered promiscuous mode [ 2237.673098][ T8242] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2239.843011][ T28] audit: type=1804 audit(1595342595.199:523): pid=8278 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17522 res=1 14:43:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:43:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000001206000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000009000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:16 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:43:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000000a000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0xf0) 14:43:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df60700000000", 0x27}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:43:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000000b000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:22 executing program 4: clone(0x2180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb534555624edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48373ef2655e3c477f0000be5d2dd15b6210d53eed19bca008388e736e518b98d91c22def1125d7b1e821039a95ad8b91ceaf3e0b5556a98591971e0735329ac", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2247.311965][ T8297] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000000e000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2247.367003][ T28] audit: type=1804 audit(1595342602.729:524): pid=8300 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17554 res=1 14:43:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df60700000000", 0x27}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:22 executing program 4: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x33}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2247.446981][ T8308] ptrace attach of "/root/syz-executor.4"[8304] was attempted by "/root/syz-executor.4"[8308] 14:43:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000000f000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2247.532648][ T8301] device vlan909 entered promiscuous mode [ 2247.561019][ T8303] device veth1855 entered promiscuous mode 14:43:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000011000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000012000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2248.252666][ T8301] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2248.351225][ T8335] ptrace attach of "/root/syz-executor.4"[8334] was attempted by "/root/syz-executor.4"[8335] 14:43:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:43:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df60700000000", 0x27}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000612000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:23 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@loopback}, 0x2, @in6=@empty, 0x0, 0x4}}, 0xe8) 14:43:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x300) 14:43:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000013000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2248.552660][ T8349] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2248.575641][ T28] audit: type=1804 audit(1595342603.939:525): pid=8350 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17225 res=1 14:43:24 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) timerfd_create(0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = timerfd_create(0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_script(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="01"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2248.690132][ T8351] device vlan910 entered promiscuous mode [ 2248.722376][ T8355] device veth1857 entered promiscuous mode [ 2248.755856][ T8351] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2248.945019][ T8372] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6", 0x3b}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x500) 14:43:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6", 0x3b}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6", 0x3b}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2249.135049][ T8374] device vlan911 entered promiscuous mode [ 2249.168838][ T8377] device veth1859 entered promiscuous mode [ 2249.207613][ T8374] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x600) 14:43:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:43:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) 14:43:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000631d000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec", 0x45}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2249.695659][ T8396] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2249.750741][ T28] audit: type=1804 audit(1595342605.109:526): pid=8406 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17286 res=1 14:43:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec", 0x45}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec", 0x45}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2250.409969][ T8407] device vlan912 entered promiscuous mode 14:43:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000004e21000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:25 executing program 4: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2250.547484][ T8416] device veth1861 entered promiscuous mode 14:43:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc98996", 0x4a}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2250.592998][ T8407] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:43:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x700) 14:43:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000003f000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc98996", 0x4a}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') sendfile(r0, r1, 0x0, 0x2) [ 2250.895557][ T8451] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2251.201169][ T8455] device vlan913 entered promiscuous mode [ 2251.271171][ T8456] device veth1863 entered promiscuous mode [ 2251.337842][ T8455] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x900) 14:43:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc98996", 0x4a}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000214e000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d69", 0x4c}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000060000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:43:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@ldst], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 2251.889887][ T8475] device vlan914 entered promiscuous mode [ 2251.938071][ T8481] device veth1865 entered promiscuous mode 14:43:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d69", 0x4c}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0xa00) 14:43:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000001d63000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:27 executing program 4: clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070339c518cd3a5dffcfe60b582f59a300000000000000003a72e49010bbda244b4148b7ac78a4cee2db9d8ff4c8cf8676f6f04d945002ddab6c92d42cc438bf16b7e955aa2bc24600883de6d35072fdb968870c208e182be8c3f7e1258f23b5", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2252.494749][ T28] audit: type=1804 audit(1595342607.850:527): pid=8496 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17263 res=1 14:43:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) [ 2252.597965][ T8501] __nla_validate_parse: 2 callbacks suppressed [ 2252.597975][ T8501] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2252.636771][ T8506] ptrace attach of "/root/syz-executor.4"[8504] was attempted by "/root/syz-executor.4"[8506] 14:43:28 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="665f07000005eb30ef523873abd39d7f896162bc33760036f369ecba", 0x1c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 14:43:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000f0000000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d69", 0x4c}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2252.852774][ T8524] ptrace attach of "/root/syz-executor.4"[8520] was attempted by "/root/syz-executor.4"[8524] 14:43:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000080)=""/236, 0x32, 0xec, 0x8}, 0x20) [ 2252.930996][ T28] audit: type=1804 audit(1595342608.290:528): pid=8526 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17257 res=1 [ 2253.001943][ T8508] device vlan915 entered promiscuous mode [ 2253.055463][ T8535] BPF: (anon) type_id=2 bits_offset=0 [ 2253.070243][ T8512] device veth1867 entered promiscuous mode [ 2253.070511][ T8535] BPF: [ 2253.090442][ T8535] BPF:Invalid member [ 2253.100884][ T8535] BPF: [ 2253.100884][ T8535] 14:43:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000040030000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) 14:43:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e", 0x4d}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2253.117080][ T8535] BPF: (anon) type_id=2 bits_offset=0 [ 2253.132379][ T8508] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2253.142961][ T8535] BPF: [ 2253.152855][ T8535] BPF:Invalid member [ 2253.202613][ T8535] BPF: [ 2253.202613][ T8535] 14:43:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0xc00) 14:43:28 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x3, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}]}, 0x70}}, 0x0) 14:43:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000003400000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2253.372254][ T28] audit: type=1804 audit(1595342608.730:529): pid=8545 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17227 res=1 [ 2253.420362][ T8547] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e", 0x4d}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050f000200"/20, @ANYRES32, @ANYBLOB="a4d228ee01ff00001800120008000100736974000c00020008000300", @ANYRES32=r2], 0x38}}, 0x0) 14:43:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090200000000000000000200000004000500140007002001000000000000fffff00000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2253.689426][ T8550] device vlan916 entered promiscuous mode [ 2253.714866][ T8552] device veth1869 entered promiscuous mode 14:43:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) [ 2253.758551][ T8550] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9c1704e09ec2f5e", 0x73}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e", 0x4d}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0xe00) 14:43:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000100000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:29 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0x0) [ 2253.990644][ T28] audit: type=1804 audit(1595342609.350:530): pid=8582 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17292 res=1 [ 2254.016749][ T8585] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:29 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @dev, @void, {@ipv4={0x800, @generic={{0x7, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@lsrr={0x83, 0x3, 0x38}, @timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) 14:43:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000200000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2254.277184][ T8587] device vlan917 entered promiscuous mode [ 2254.320401][ T8591] device veth1871 entered promiscuous mode [ 2254.382456][ T8587] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600), 0x0, 0x0, 0x0) 14:43:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:29 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded80d4895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 14:43:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000300000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0xf00) [ 2254.608608][ T8613] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x6}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000400000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2254.720666][ T28] audit: type=1804 audit(1595342610.080:531): pid=8621 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=17325 res=1 14:43:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000500000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600), 0x0, 0x0, 0x0) [ 2254.919664][ T8618] device vlan918 entered promiscuous mode [ 2254.946357][ T8620] device veth1873 entered promiscuous mode 14:43:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2255.088224][ T8618] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000600000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2255.194926][ T28] audit: type=1804 audit(1595342610.560:532): pid=8646 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16650 res=1 14:43:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x2000) 14:43:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2255.591009][ T8657] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="665f07000005eb301420387397d39d7f984462bc33760036f300000000007d86", 0x20}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 14:43:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000800000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a6df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000600), 0x0, 0x0, 0x0) 14:43:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000900000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2255.837782][ T8659] device vlan919 entered promiscuous mode [ 2255.839974][ T8678] ptrace attach of "/root/syz-executor.4"[8676] was attempted by "/root/syz-executor.4"[8678] 14:43:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5}]}, 0x1c}}, 0x0) 14:43:31 executing program 4: socket$inet6(0xa, 0x0, 0xfffffffb) [ 2255.958103][ T8662] device veth1875 entered promiscuous mode [ 2256.015278][ T8659] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000a00000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x3f00) 14:43:31 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 14:43:31 executing program 0: clone(0x2180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb534555624edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48373ef2655e3c477f0000be5d2dd15b6210d5", 0xcb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 14:43:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000b00000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000001300)=@raw={'raw\x00', 0x8, 0x3, 0x240, 0x0, 0xd0, 0xd0, 0x1d0, 0xd0, 0x1d0, 0x1d0, 0x1d0, 0xd0, 0x1d0, 0x3, 0x0, {[{{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_team\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2a0) [ 2256.539207][ T8711] ptrace attach of "/root/syz-executor.0"[8710] was attempted by "/root/syz-executor.0"[8711] 14:43:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0x100000530) 14:43:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000e00000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2257.178785][ T8712] device vlan920 entered promiscuous mode 14:43:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000000f00000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:32 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x3, &(0x7f0000002400)=[{&(0x7f00000001c0)="0400050900000000666174000404090a020002740ef8", 0x16}, {0x0, 0x0, 0xfffffffffffffff9}, {&(0x7f00000000c0)='i', 0x1, 0x25}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2257.365153][ T8716] device veth1877 entered promiscuous mode 14:43:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:32 executing program 4: clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070339c518cd3a5dffcfe60b582f59a300000000000000003a72e49010bbda244b4148b7ac78a4cee2db9d8ff4c8cf8676f6f04d945002ddab6c92d42cc438bf16b7e955aa2bc24600883de6d35072fdb968870c208e182be8c3f7e1258f23b5b424af2e71e0550ec28ad4f14df18e88faf380d214f51f30e0c877b77f5aff03166f1c480d8f1464e69d79c3f765e420eb8341ee61cf05ba2df0613e6166680f63effb83f0b6a60f3867525715223b29a829628bd3db764919c0c7c4e597d275f88bb60963da7e457a5aed6134d26b02ceb2421c6ad2771be822d2b62fa3", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:43:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x4000) 14:43:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000001000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:32 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x100, {0x10}, 0xc3}}, 0xa0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001180)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f0000000180)=""/4082, 0xff2}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r3, &(0x7f00000017c0), 0x218, 0x0) 14:43:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58", 0x3a}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:33 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x100, {0x10}, 0xc3}}, 0xa0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f0000000180)=""/4082, 0xff2}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x218, 0x0) [ 2257.640723][ T8745] __nla_validate_parse: 2 callbacks suppressed [ 2257.640734][ T8745] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2257.657039][ T8748] ptrace attach of "/root/syz-executor.4"[8747] was attempted by "/root/syz-executor.4"[8748] 14:43:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x42}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000200)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:43:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58", 0x3a}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000001100000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x42}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000200)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:43:33 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) r1 = dup(0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x0, {0x10}, 0xc3}}, 0xa0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001180)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f0000000180)=""/4082, 0xff2}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x218, 0x0) [ 2257.987965][ T8752] device vlan921 entered promiscuous mode [ 2258.040901][ T8756] device veth1879 entered promiscuous mode [ 2258.089308][ T8752] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) 14:43:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) dup(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r2, r0}}, 0x5b) 14:43:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x4800) 14:43:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x42}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000200)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:43:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58", 0x3a}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000001200000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2258.499082][ T8790] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000061200000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:34 executing program 4: ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f00000000c0)=0x7) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(0xffffffffffffffff) syz_open_dev$vcsu(0x0, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) r2 = dup(r1) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x2000, 0x882200}) dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000000)={0x0, @time={0x0, 0x4}, 0x0, {0x5}}) socket$nl_netfilter(0x10, 0x3, 0xc) read$FUSE(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) 14:43:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) dup3(r1, r0, 0x0) 14:43:34 executing program 0: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffff7fff}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, "d0dda952daf43c08a4bcd60a12956da90ef6e14590a6fd7becc35f971234ff464e686bd9fbb43dde35902645b25d7051dbc50630b90721d0d4d91afc9243afe55401000000f1a432fa00"}, 0xd8) chdir(&(0x7f0000000280)='./file0\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x40305839, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x14000004, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) 14:43:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e587", 0x57}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e587", 0x57}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) [ 2259.435231][ T8795] device vlan922 entered promiscuous mode [ 2259.472223][ T8799] device veth1881 entered promiscuous mode 14:43:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000001300000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2259.567183][ T8815] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x4c00) 14:43:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e587", 0x57}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2260.146814][ T8837] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000003f00000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) 14:43:35 executing program 4: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() socket$pppl2tp(0x18, 0x1, 0x1) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='L'], 0x10) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x4040, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0)={0x2}, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x3b, 0x0, "d0dda952daf43c08a4bcd60a6445964f031512956da90ef6e14590a6fd7becc35f971234e4464e686bd9fbb43dde35902645b25d7051dbc50630b90721d0d4d91afc9243afe5543ab07fc6f1a432fa00"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, "d0dda952daf43c08a4bcd60a12956da90ef6e14590a6fd7becc35f971234ff464e686bd9fbb43dde35902645b25d7051dbc50630b90721d0d4d91afc9243afe55401000000f1a432fa00"}, 0xd8) chdir(&(0x7f0000000280)='./file0\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x40305839, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x14000004, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)=""/155, 0x9b) 14:43:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01", 0x65}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) [ 2260.421018][ T8842] device vlan923 entered promiscuous mode 14:43:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000214e00000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2260.463375][ T8846] device veth1883 entered promiscuous mode [ 2260.481952][ T8837] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:36 executing program 0: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffff7fff}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x4040, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x40305839, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x14000004, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) 14:43:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x5865) 14:43:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01", 0x65}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0902000000000000000002000000040005001400070020010000000000000000006000000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0) [ 2261.291523][ T8878] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:43:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01", 0x65}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) [ 2261.659960][ T8881] device vlan924 entered promiscuous mode [ 2261.730973][ T8881] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2262.243084][ T8897] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2262.649429][ T8899] device veth1887 entered promiscuous mode [ 2262.729000][ T8898] device vlan925 entered promiscuous mode [ 2262.825186][ T8898] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2366.291773][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 2366.298787][ C0] rcu: 0-....: (1 GPs behind) idle=f72/1/0x4000000000000000 softirq=188945/188946 fqs=2652 [ 2366.309476][ C0] (t=10500 jiffies g=389749 q=9857) [ 2366.314758][ C0] NMI backtrace for cpu 0 [ 2366.319088][ C0] CPU: 0 PID: 8861 Comm: syz-executor.4 Not tainted 5.8.0-rc6-syzkaller #0 [ 2366.327669][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2366.337721][ C0] Call Trace: [ 2366.341010][ C0] [ 2366.343873][ C0] dump_stack+0x18f/0x20d [ 2366.348217][ C0] nmi_cpu_backtrace.cold+0x70/0xb1 [ 2366.353430][ C0] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 2366.359068][ C0] nmi_trigger_cpumask_backtrace+0x1b3/0x223 [ 2366.365059][ C0] rcu_dump_cpu_stacks+0x194/0x1cf [ 2366.370182][ C0] rcu_sched_clock_irq.cold+0x5b3/0xccc [ 2366.375922][ C0] ? lock_is_held_type+0xb0/0xe0 [ 2366.380873][ C0] ? rcutree_dead_cpu+0x10/0x10 [ 2366.385730][ C0] ? lockdep_hardirqs_off+0x66/0xa0 [ 2366.390926][ C0] ? trace_hardirqs_off+0x27/0x210 [ 2366.396066][ C0] update_process_times+0x25/0x60 [ 2366.401112][ C0] tick_sched_handle+0x9b/0x180 [ 2366.405961][ C0] tick_sched_timer+0x108/0x290 [ 2366.410818][ C0] __hrtimer_run_queues+0x1d5/0xfc0 [ 2366.416013][ C0] ? can_stop_idle_tick+0x290/0x290 [ 2366.421220][ C0] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 2366.427205][ C0] ? ktime_get_update_offsets_now+0x1c4/0x250 [ 2366.433309][ C0] hrtimer_interrupt+0x32a/0x930 [ 2366.438268][ C0] __sysvec_apic_timer_interrupt+0x142/0x5e0 [ 2366.444242][ C0] sysvec_apic_timer_interrupt+0x4f/0x120 [ 2366.450058][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2366.456042][ C0] RIP: 0010:lock_acquire+0x270/0xad0 [ 2366.461311][ C0] Code: 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 0f 85 f8 06 00 00 48 83 3d 85 d1 5a 08 00 0f 84 a6 05 00 00 48 8b 7c 24 08 57 9d <0f> 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 48 03 44 24 10 48 c7 [ 2366.480885][ C0] RSP: 0018:ffffc90000007bf0 EFLAGS: 00000286 [ 2366.486927][ C0] RAX: 1ffffffff1369c11 RBX: ffff8881ef9a44c0 RCX: 0000000000000001 [ 2366.494869][ C0] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: 0000000000000286 [ 2366.502808][ C0] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8c59aaef [ 2366.510766][ C0] R10: fffffbfff18b355d R11: 0000000000000000 R12: 0000000000000000 [ 2366.518710][ C0] R13: ffff888058eaacc8 R14: 0000000000000000 R15: ffff888042bc20a8 [ 2366.526678][ C0] ? lock_release+0x8d0/0x8d0 [ 2366.531332][ C0] ? lock_release+0x8d0/0x8d0 [ 2366.535987][ C0] ? kvm_sched_clock_read+0x14/0x40 [ 2366.541172][ C0] _raw_spin_lock+0x2a/0x40 [ 2366.545682][ C0] ? mrp_join_timer+0x23/0xc0 [ 2366.550367][ C0] mrp_join_timer+0x23/0xc0 [ 2366.554857][ C0] call_timer_fn+0x1ac/0x760 [ 2366.559429][ C0] ? mrp_attr_event+0x220/0x220 [ 2366.564264][ C0] ? add_timer_on+0x4d0/0x4d0 [ 2366.568922][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2366.575056][ C0] ? _raw_spin_unlock_irq+0x1f/0x80 [ 2366.580248][ C0] ? mrp_attr_event+0x220/0x220 [ 2366.585085][ C0] __run_timers.part.0+0x54c/0xa20 [ 2366.590177][ C0] ? call_timer_fn+0x760/0x760 [ 2366.594922][ C0] ? kvm_sched_clock_read+0x14/0x40 [ 2366.600100][ C0] ? sched_clock+0x2a/0x40 [ 2366.604488][ C0] ? sched_clock_cpu+0x18/0x1b0 [ 2366.609315][ C0] run_timer_softirq+0xae/0x1a0 [ 2366.614146][ C0] __do_softirq+0x34c/0xa60 [ 2366.618638][ C0] asm_call_on_stack+0xf/0x20 [ 2366.623284][ C0] [ 2366.626196][ C0] do_softirq_own_stack+0x111/0x170 [ 2366.631455][ C0] irq_exit_rcu+0x229/0x270 [ 2366.635937][ C0] sysvec_apic_timer_interrupt+0x54/0x120 [ 2366.641663][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2366.647612][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x9/0x60 [ 2366.653650][ C0] Code: 5d be 03 00 00 00 e9 56 db 23 02 66 0f 1f 44 00 00 48 8b be b0 01 00 00 e8 b4 ff ff ff 31 c0 c3 90 65 48 8b 14 25 00 ff 01 00 <65> 8b 05 20 42 8e 7e a9 00 01 ff 00 48 8b 34 24 74 0f f6 c4 01 74 [ 2366.673226][ C0] RSP: 0018:ffffc9001a9ff818 EFLAGS: 00000246 [ 2366.679262][ C0] RAX: 0000000000000002 RBX: 000000000000000d RCX: ffffffff83629507 [ 2366.687200][ C0] RDX: ffff8881ef9a44c0 RSI: ffff8881ef9a44c0 RDI: 0000000000000005 [ 2366.695143][ C0] RBP: ffff88808f7eb600 R08: 0000000000000001 R09: ffffffff8cac46e7 [ 2366.703084][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000100 [ 2366.711028][ C0] R13: 000000000000026d R14: dffffc0000000000 R15: 0000000000000000 [ 2366.718988][ C0] ? tomoyo_domain_quota_is_ok+0x307/0x550 [ 2366.724771][ C0] tomoyo_domain_quota_is_ok+0x31a/0x550 [ 2366.730375][ C0] tomoyo_supervisor+0x2d4/0xeb0 [ 2366.735276][ C0] ? sched_clock_cpu+0x18/0x1b0 [ 2366.740098][ C0] ? sched_clock_cpu+0x18/0x1b0 [ 2366.744917][ C0] ? tomoyo_profile+0x50/0x50 [ 2366.749563][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2366.755746][ C0] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 2366.761715][ C0] ? trace_hardirqs_on+0x5f/0x220 [ 2366.766717][ C0] ? lockdep_hardirqs_on+0x6a/0xe0 [ 2366.771815][ C0] ? __sanitizer_cov_trace_const_cmp1+0x4/0x20 [ 2366.777948][ C0] ? tomoyo_check_acl+0x315/0x410 [ 2366.782955][ C0] tomoyo_mount_acl+0x524/0x840 [ 2366.787789][ C0] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 2366.793318][ C0] ? lockdep_hardirqs_on+0x6a/0xe0 [ 2366.798432][ C0] ? avc_has_perm_noaudit+0x390/0x390 [ 2366.803797][ C0] ? tomoyo_domain+0xb9/0x150 [ 2366.808449][ C0] ? tomoyo_profile+0x42/0x50 [ 2366.813101][ C0] tomoyo_mount_permission+0x151/0x3f0 [ 2366.818532][ C0] ? tomoyo_mount_permission+0xfa/0x3f0 [ 2366.824079][ C0] ? tomoyo_mount_acl+0x840/0x840 [ 2366.829096][ C0] security_sb_mount+0x66/0xc0 [ 2366.833836][ C0] do_mount+0x1c0/0x1fe0 [ 2366.838056][ C0] ? copy_mount_string+0x40/0x40 [ 2366.842963][ C0] ? __might_fault+0x190/0x1d0 [ 2366.847695][ C0] ? _copy_from_user+0x138/0x190 [ 2366.852606][ C0] ? memdup_user+0x7c/0xd0 [ 2366.857001][ C0] __x64_sys_mount+0x18f/0x230 [ 2366.861738][ C0] do_syscall_64+0x60/0xe0 [ 2366.866124][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2366.872076][ C0] RIP: 0033:0x45c1d9 [ 2366.875941][ C0] Code: Bad RIP value. [ 2366.879980][ C0] RSP: 002b:00007f3e8cf1ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2366.888362][ C0] RAX: ffffffffffffffda RBX: 000000000001fc80 RCX: 000000000045c1d9 [ 2366.896303][ C0] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000020000000 [ 2366.904246][ C0] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 2366.912191][ C0] R10: 0000000000007a04 R11: 0000000000000246 R12: 000000000078bf0c [ 2366.920134][ C0] R13: 00007fff149add8f R14: 00007f3e8cf1b9c0 R15: 000000000078bf0c 14:43:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002cc0)="6f18f1e28ddfa96d23e0062cc141e42e82fe3317edf88dd1549867c816590740f6837149a41ccef97eafbfb7b8089a0e2156f6c3aa2ca7868d58d33b8206932f73972c186cc68ed3ba30c3c094ca6f42602a87c5b8e5874d64993e29a3f80042a0cbb6eb01e9cae57795c5c9", 0x6c}, {&(0x7f0000000340)="9819dcc40fafd4f4fb137ce326e3b52f935d35741fc8773c0f2c45b1132edff07df607000000000000008f9aa383edf7c5bd6b9607020d6b2d15d6709ad8a3336406313cec092fc989965d690e36", 0x4e}, {&(0x7f00000003c0)="debf7d", 0x3}, {&(0x7f00000004c0)="02834a96cd577225b6897894710b122f29a528a2a9183d1331f3bce55088ef37c031cfc1964005364a9908504958568ff6af5cdbf3bee791826b", 0x3a}, {&(0x7f0000000240)="fe132eca60f4a111bc6de99127d8786dd1b00affebbd6e26625e75526322ed1e0e2bda2f72d1eeba86ef4e38969e2b11044e3ac1c937e80c227dd22f1a26c069e6498e1ae8c58b7be6bddf7c2ecf6a3c95de20028a69de51bc688f48dade0faf8b9a826e3b7febec46d3b03732419a3ecc409b092ef87b4cd2aefc03005fe38a557d9192853023ff57850499dc54e7300888", 0x92}, {&(0x7f0000000400)="73f5f091ba236670b60286e326158cbc4de1f311e2b35c088e4d9226a945bbef8bcac07e1e8f7ccf02aa47a73bbee6880d4695507e081e0d526a719d0b0557b5509a5cdf0abe48adee730bb768c61e8fe6377934582190a221a7bde287b5ea19c354e957a347baebb0f6d8789b0a043510cc803acdf7a289d5fd9a833b5b48dbd88506739506b4cc81a09adf83", 0x8d}, {&(0x7f0000000600)="ef54796c23e6de7a2ad45b8a308af4bd9eb33d71385d6c6416edd816d136d35383b162770af8e51de402a08baab4cc782db2859e2b3794e9f59776fd0fe565d76561af89b9a019dc580673ef1127d83d5feeea060c2f55c2813f126d4af535da18757c147a64fc1654d5b23a885f8e5bddd28d", 0x73}], 0x7}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 14:43:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x320}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x20313}}, 0x20}}, 0x6000) 14:43:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09020000000000000000020000000400050014000700200100000000000000001d6300000001050002000a000000050004000100000014000900fe880000000000000000000000000001060001004e21000014000900fc0100000000000000000000000000000400050006000a"], 0x78}}, 0x0)