[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 73.641626][ T27] audit: type=1800 audit(1583742434.224:25): pid=9524 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 73.662431][ T27] audit: type=1800 audit(1583742434.224:26): pid=9524 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 73.721191][ T27] audit: type=1800 audit(1583742434.224:27): pid=9524 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.249' (ECDSA) to the list of known hosts. 2020/03/09 08:27:25 fuzzer started 2020/03/09 08:27:26 dialing manager at 10.128.0.26:37475 2020/03/09 08:27:26 syscalls: 1380 2020/03/09 08:27:26 code coverage: enabled 2020/03/09 08:27:26 comparison tracing: enabled 2020/03/09 08:27:26 extra coverage: enabled 2020/03/09 08:27:26 setuid sandbox: enabled 2020/03/09 08:27:26 namespace sandbox: enabled 2020/03/09 08:27:26 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/09 08:27:26 fault injection: enabled 2020/03/09 08:27:26 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/09 08:27:26 net packet injection: enabled 2020/03/09 08:27:26 net device setup: enabled 2020/03/09 08:27:26 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/09 08:27:26 devlink PCI setup: PCI device 0000:00:10.0 is not available 08:29:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=@setlink={0x2c, 0x13, 0x811, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xc}]}, 0x2c}}, 0x0) 08:29:21 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000000)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in=@dev, {@in=@local, @in=@remote}, {{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x44, 0x5, [{{@in6=@remote}, 0x0, @in6, 0x0, 0x5}]}]}, 0x16c}}, 0x0) syzkaller login: [ 201.196781][ T9693] IPVS: ftp: loaded support on port[0] = 21 [ 201.342453][ T9693] chnl_net:caif_netlink_parms(): no params data found [ 201.448986][ T9697] IPVS: ftp: loaded support on port[0] = 21 [ 201.465157][ T9693] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.473798][ T9693] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.482162][ T9693] device bridge_slave_0 entered promiscuous mode [ 201.502043][ T9693] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.509184][ T9693] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.518404][ T9693] device bridge_slave_1 entered promiscuous mode 08:29:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 201.553690][ T9693] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.594809][ T9693] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.683901][ T9693] team0: Port device team_slave_0 added [ 201.703650][ T9693] team0: Port device team_slave_1 added [ 201.737381][ T9693] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 201.745565][ T9693] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.773382][ T9693] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 201.797207][ T9701] IPVS: ftp: loaded support on port[0] = 21 [ 201.827135][ T9693] batman_adv: batadv0: Adding interface: batadv_slave_1 08:29:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)}, 0x10) socketpair(0x2c, 0x800, 0xff, &(0x7f0000000040)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f0000000100)=0x10001) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000), 0xc) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[@ANYBLOB='B'], 0x1) splice(r3, 0x0, r1, 0x0, 0xd86dac9, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000280)="f04ae0d27d087e3a55368725b79995004536209bdb852bc8ab5d6abfc204b96d8edd3ebe0b116d9a82e2d9c6664355da1a987027ea53b8d032adc5fe94e61a231cdf82c26293800bcae54b57c848213614a6c0af"}, 0x20) [ 201.834405][ T9693] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.863371][ T9693] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 201.916642][ T9697] chnl_net:caif_netlink_parms(): no params data found [ 202.014909][ T9693] device hsr_slave_0 entered promiscuous mode [ 202.073684][ T9693] device hsr_slave_1 entered promiscuous mode [ 202.140536][ T9704] IPVS: ftp: loaded support on port[0] = 21 08:29:22 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000040)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr=0xfffffffd, @local}, @parameter_prob={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89, 0x0, @multicast2, @broadcast, {[@rr={0x7, 0x3}, @timestamp_addr={0x44, 0x3c, 0x0, 0x1, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}}, {}, {@remote}, {@empty}, {@local}, {}, {@dev}]}]}}}}}}}, 0x0) [ 202.387282][ T9697] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.411381][ T9697] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.419555][ T9697] device bridge_slave_0 entered promiscuous mode [ 202.466818][ T9710] IPVS: ftp: loaded support on port[0] = 21 [ 202.467417][ T9697] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.479910][ T9697] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.503121][ T9697] device bridge_slave_1 entered promiscuous mode [ 202.512258][ T9701] chnl_net:caif_netlink_parms(): no params data found 08:29:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x8, 0x249e1e, 0x8000000001}, 0x25) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) [ 202.677404][ T9697] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 202.734487][ T9697] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 202.790493][ T9693] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 202.844539][ T9693] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 202.909690][ T9693] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 202.969804][ T9704] chnl_net:caif_netlink_parms(): no params data found [ 203.001987][ T9693] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 203.047495][ T9697] team0: Port device team_slave_0 added [ 203.063544][ T9714] IPVS: ftp: loaded support on port[0] = 21 [ 203.072964][ T9701] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.080042][ T9701] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.089205][ T9701] device bridge_slave_0 entered promiscuous mode [ 203.098928][ T9701] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.106066][ T9701] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.114589][ T9701] device bridge_slave_1 entered promiscuous mode [ 203.125583][ T9697] team0: Port device team_slave_1 added [ 203.191007][ T9701] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 203.200684][ T9697] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 203.208042][ T9697] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.234507][ T9697] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 203.247088][ T9697] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 203.254763][ T9697] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.280700][ T9697] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 203.312548][ T9701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 203.334441][ T9704] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.341752][ T9704] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.349389][ T9704] device bridge_slave_0 entered promiscuous mode [ 203.359892][ T9704] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.367001][ T9704] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.375448][ T9704] device bridge_slave_1 entered promiscuous mode [ 203.474941][ T9697] device hsr_slave_0 entered promiscuous mode [ 203.521580][ T9697] device hsr_slave_1 entered promiscuous mode [ 203.561470][ T9697] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 203.569279][ T9697] Cannot create hsr debugfs directory [ 203.592040][ T9701] team0: Port device team_slave_0 added [ 203.608720][ T9710] chnl_net:caif_netlink_parms(): no params data found [ 203.625727][ T9704] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 203.636579][ T9701] team0: Port device team_slave_1 added [ 203.660072][ T9704] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 203.737289][ T9701] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 203.744596][ T9701] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.770779][ T9701] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 203.792880][ T9704] team0: Port device team_slave_0 added [ 203.799066][ T9701] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 203.806884][ T9701] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.833207][ T9701] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 203.876963][ T9704] team0: Port device team_slave_1 added [ 203.960317][ T9704] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 203.967773][ T9704] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.994111][ T9704] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 204.006770][ T9704] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 204.013791][ T9704] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.039736][ T9704] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 204.133690][ T9701] device hsr_slave_0 entered promiscuous mode [ 204.171766][ T9701] device hsr_slave_1 entered promiscuous mode [ 204.241327][ T9701] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 204.248912][ T9701] Cannot create hsr debugfs directory [ 204.255137][ T9710] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.262681][ T9710] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.270383][ T9710] device bridge_slave_0 entered promiscuous mode [ 204.281044][ T9710] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.288339][ T9710] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.296820][ T9710] device bridge_slave_1 entered promiscuous mode [ 204.353146][ T9710] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 204.366151][ T9710] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 204.425089][ T9704] device hsr_slave_0 entered promiscuous mode [ 204.471814][ T9704] device hsr_slave_1 entered promiscuous mode [ 204.511325][ T9704] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 204.518945][ T9704] Cannot create hsr debugfs directory [ 204.545652][ T9710] team0: Port device team_slave_0 added [ 204.555030][ T9714] chnl_net:caif_netlink_parms(): no params data found [ 204.586239][ T9710] team0: Port device team_slave_1 added [ 204.699135][ T9710] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 204.706177][ T9710] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.733480][ T9710] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 204.748940][ T9710] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 204.755991][ T9710] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.783588][ T9710] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 204.832667][ T9697] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 204.883409][ T9697] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 204.914914][ T9697] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 204.977513][ T9697] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 205.033489][ T9714] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.040591][ T9714] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.049190][ T9714] device bridge_slave_0 entered promiscuous mode [ 205.060363][ T9714] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.067572][ T9714] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.075789][ T9714] device bridge_slave_1 entered promiscuous mode [ 205.136277][ T9714] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 205.148832][ T9714] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 205.206518][ T9710] device hsr_slave_0 entered promiscuous mode [ 205.265086][ T9710] device hsr_slave_1 entered promiscuous mode [ 205.311356][ T9710] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 205.318964][ T9710] Cannot create hsr debugfs directory [ 205.392348][ T9693] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.410604][ T9714] team0: Port device team_slave_0 added [ 205.428951][ T9701] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 205.474767][ T9714] team0: Port device team_slave_1 added [ 205.504677][ T9701] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 205.566443][ T9701] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 205.629945][ T9701] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 205.689203][ T9714] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 205.696437][ T9714] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 205.723295][ T9714] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 205.740449][ T9714] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 205.748277][ T9714] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 205.774404][ T9714] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 205.842525][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.850678][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.866299][ T9693] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.875032][ T9704] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 205.963580][ T9714] device hsr_slave_0 entered promiscuous mode [ 206.001932][ T9714] device hsr_slave_1 entered promiscuous mode [ 206.041834][ T9714] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 206.049423][ T9714] Cannot create hsr debugfs directory [ 206.082534][ T9704] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 206.159829][ T9704] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 206.214122][ T9704] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 206.299396][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.308374][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.317586][ T2781] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.324781][ T2781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.332658][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.341134][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.349794][ T2781] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.356885][ T2781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.394085][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.402982][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.448544][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.463247][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.472523][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.481528][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 206.539704][ T9697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.548984][ T9710] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 206.615613][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.625311][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.634302][ T9710] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 206.709116][ T9710] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 206.755874][ T9710] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 206.824389][ T9701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.855876][ T9697] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.878876][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.888178][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.897041][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.905269][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.913391][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.922017][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.930286][ T2800] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.937428][ T2800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.976531][ T9701] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.986462][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.994548][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.003168][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.012240][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.020742][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.029673][ T2781] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.036759][ T2781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.044851][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.052810][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.063312][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 207.098093][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.109165][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.118363][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.128423][ T2781] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.135600][ T2781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.144070][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.152966][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.161449][ T2781] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.168504][ T2781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.193048][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.200941][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.231315][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.240228][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.249429][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.258537][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.267290][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.280704][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.297942][ T9704] 8021q: adding VLAN 0 to HW filter on device bond0 [ 207.340908][ T9693] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 207.356325][ T9697] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 207.367109][ T9697] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 207.378617][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.387484][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.395943][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.404650][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 207.412958][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.420342][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.428738][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.437551][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 207.446004][ T9714] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 207.493765][ T9714] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 207.533905][ T9714] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 207.574757][ T9714] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 207.679346][ T9704] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.686455][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.695009][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.703257][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.712624][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.748254][ T9701] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 207.758710][ T9701] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 207.773390][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.781870][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.790394][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.799022][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.807614][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.816744][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.825335][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.833945][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 207.841746][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.851179][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 207.879326][ T9697] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 207.916534][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 207.925959][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 207.938448][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.947635][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.959710][ T2800] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.966806][ T2800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.020322][ T9693] device veth0_vlan entered promiscuous mode [ 208.027880][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.036756][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.045854][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.055156][ T2758] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.062274][ T2758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.070144][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.078842][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 208.087386][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 208.096128][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.104829][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 208.113217][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.134699][ T9701] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 208.165024][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.174590][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.182628][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 208.190022][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 208.197501][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 208.205976][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.232619][ T9710] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.245677][ T9697] device veth0_vlan entered promiscuous mode [ 208.262287][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.270079][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.278151][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 208.287095][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.296411][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 208.305416][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.314375][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 208.334780][ T9693] device veth1_vlan entered promiscuous mode [ 208.350971][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 208.359587][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 208.369023][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 208.379450][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 208.388063][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.396697][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 208.405596][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.447634][ T9704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 208.465149][ T9697] device veth1_vlan entered promiscuous mode [ 208.473979][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 208.486301][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 208.494705][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 208.503747][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.512393][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.520153][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.528200][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.537872][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.550214][ T9701] device veth0_vlan entered promiscuous mode [ 208.561818][ T9710] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.580005][ T9714] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.603635][ T9701] device veth1_vlan entered promiscuous mode [ 208.639520][ T9714] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.689322][ T9697] device veth0_macvtap entered promiscuous mode [ 208.696705][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 208.705960][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 208.715553][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 208.723773][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.732413][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.741169][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 208.749939][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 208.758873][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 208.767605][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 208.793655][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 208.802987][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.813220][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.821849][ T2758] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.828975][ T2758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.837039][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.845988][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.855866][ T2758] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.863163][ T2758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.870874][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.879838][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.888440][ T2758] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.895575][ T2758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.904947][ T9693] device veth0_macvtap entered promiscuous mode [ 208.926752][ T9697] device veth1_macvtap entered promiscuous mode [ 208.946632][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 208.957202][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 208.965746][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.974180][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.982751][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.991321][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.999669][ T2800] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.006757][ T2800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.015744][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.024685][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.040329][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 209.049324][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 209.058250][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 209.065933][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 209.098562][ T9701] device veth0_macvtap entered promiscuous mode [ 209.108013][ T9693] device veth1_macvtap entered promiscuous mode [ 209.119014][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 209.127409][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.136487][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.145195][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.156212][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.165413][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.174541][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.199292][ T9704] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 209.211689][ T9701] device veth1_macvtap entered promiscuous mode [ 209.235030][ T9693] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 209.242778][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 209.258082][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.266442][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.275487][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.284348][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.293345][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.302326][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.310580][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.318972][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 209.327671][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.342353][ T9697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 209.354138][ T9697] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.365394][ T9697] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 209.387106][ T9693] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 209.399926][ T9714] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 209.412103][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.426452][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.434562][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.443232][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.451548][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.459787][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.468513][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 209.478340][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.487127][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 209.496169][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.505430][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.513979][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.525726][ T9697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 209.537214][ T9697] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.548603][ T9697] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 209.578401][ T9710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.595596][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 209.604683][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.624858][ T9701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 209.639574][ T9701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.649463][ T9701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 209.660860][ T9701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.672917][ T9701] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 209.706112][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 209.717152][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 209.728689][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 209.737984][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.759825][ T9704] device veth0_vlan entered promiscuous mode [ 209.773858][ T9701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 209.785067][ T9701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.795403][ T9701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 209.805888][ T9701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.818082][ T9701] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 209.832542][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 209.846108][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.855803][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 209.865262][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.976021][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.986122][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.996491][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 210.004425][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.012261][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 210.019641][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.227964][ T9704] device veth1_vlan entered promiscuous mode [ 210.249790][ T9710] 8021q: adding VLAN 0 to HW filter on device batadv0 08:29:30 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x2000000000000074, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) socketpair(0x1a, 0x2, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x5}], 0x1) [ 210.314872][ T9714] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.505682][ T9704] device veth0_macvtap entered promiscuous mode [ 210.527521][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 210.543887][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 210.577752][ T9704] device veth1_macvtap entered promiscuous mode [ 210.601974][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 08:29:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x201, 0x0, 0x0, {}, @NFT_OBJECT_CT_TIMEOUT=@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}}, @NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x401}], {0x14}}, 0x5c}}, 0x0) [ 210.625502][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 210.699389][ T9754] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:29:31 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000200003041dfffd946f6105000a00000a1f000003141008000800180012001200140000001a00ffff", 0x2c}], 0x1}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 210.760716][ T9754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.772328][ T9754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 08:29:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 210.943919][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 210.977785][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.002941][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 211.033686][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.074556][ T9704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 211.085291][ T9704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.097380][ T9704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 211.108288][ T9704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 08:29:31 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x2000000000000074, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) socketpair(0x1a, 0x2, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x5}], 0x1) [ 211.118525][ T9704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 211.129364][ T9704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.151574][ T9704] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 211.177272][ T9765] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 211.196801][ T9765] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 211.207185][ T9765] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 211.235284][ T9710] device veth0_vlan entered promiscuous mode [ 211.272990][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 08:29:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 211.293558][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 211.322043][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 211.330478][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.343866][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 211.368972][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.387201][ T9704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 211.406441][ T9704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.429068][ T9704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 211.439687][ T9704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.456064][ T9704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 211.468134][ T9704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.480369][ T9704] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 211.500356][ T9714] device veth0_vlan entered promiscuous mode [ 211.520572][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 211.530369][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 211.542559][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 211.596612][ T2801] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.606097][ T2801] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.621455][ T2801] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.636738][ T2801] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 08:29:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 211.652484][ T2801] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 211.662363][ T2801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 08:29:32 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x2000000000000074, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) socketpair(0x1a, 0x2, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x5}], 0x1) [ 211.698043][ T9710] device veth1_vlan entered promiscuous mode [ 211.840847][ T9714] device veth1_vlan entered promiscuous mode [ 211.863549][ T9776] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 211.877393][ T9776] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 211.885730][ T9776] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 08:29:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0xf}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) [ 212.030871][ T9710] device veth0_macvtap entered promiscuous mode [ 212.101709][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 212.110514][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 212.154953][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 212.172737][ T9710] device veth1_macvtap entered promiscuous mode [ 212.193158][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 212.202152][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 212.236837][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 212.297439][ T9714] device veth0_macvtap entered promiscuous mode [ 212.373241][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 212.399013][ T9714] device veth1_macvtap entered promiscuous mode [ 212.447749][ T9710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.471266][ T9710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.481107][ T9710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.492034][ T9710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.508688][ T9710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.530727][ T9710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.548915][ T9710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.571294][ T9710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.590625][ T9710] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 212.602615][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 212.622899][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 212.648857][ T9710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 212.687799][ T9710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.699389][ T9710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 212.741393][ T9710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 08:29:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)}, 0x10) socketpair(0x2c, 0x800, 0xff, &(0x7f0000000040)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f0000000100)=0x10001) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000), 0xc) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[@ANYBLOB='B'], 0x1) splice(r3, 0x0, r1, 0x0, 0xd86dac9, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000280)="f04ae0d27d087e3a55368725b79995004536209bdb852bc8ab5d6abfc204b96d8edd3ebe0b116d9a82e2d9c6664355da1a987027ea53b8d032adc5fe94e61a231cdf82c26293800bcae54b57c848213614a6c0af"}, 0x20) [ 212.759246][ T9710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 212.769733][ T9710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.790560][ T9710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 212.810635][ T9710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.829247][ T9710] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 212.842397][ T9714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.856947][ T9714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.868786][ T9714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.879263][ T9714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.889379][ T9714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.899871][ T9714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.909721][ T9714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.933780][ T9714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.943841][ T9714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.954445][ T9714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.967617][ T9714] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 212.977893][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 212.988390][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 212.997357][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 213.006180][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.036790][ T9714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.082266][ T9714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.101739][ T9714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.112252][ T9714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.122120][ T9714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.141140][ T9714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.151035][ T9714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.161599][ T9714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.172267][ T9714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.182753][ T9714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.196470][ T9714] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 213.224327][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 213.233642][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 08:29:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000000)={@void, @val, @mpls={[], @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @remote}, {0x0, 0x0, 0x8}}}}, 0xfdef) 08:29:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 08:29:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vlan1\x00', 0x400}) ioctl$TUNSETCARRIER(r0, 0x400454d4, &(0x7f00000000c0)=0x1) 08:29:34 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x2000000000000074, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) socketpair(0x1a, 0x2, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x5}], 0x1) 08:29:34 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x2000000000000074, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) socketpair(0x1a, 0x2, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x5}], 0x1) 08:29:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)}, 0x10) socketpair(0x2c, 0x800, 0xff, &(0x7f0000000040)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f0000000100)=0x10001) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000), 0xc) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[@ANYBLOB='B'], 0x1) splice(r3, 0x0, r1, 0x0, 0xd86dac9, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000280)="f04ae0d27d087e3a55368725b79995004536209bdb852bc8ab5d6abfc204b96d8edd3ebe0b116d9a82e2d9c6664355da1a987027ea53b8d032adc5fe94e61a231cdf82c26293800bcae54b57c848213614a6c0af"}, 0x20) 08:29:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)}, 0x10) socketpair(0x2c, 0x800, 0xff, &(0x7f0000000040)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f0000000100)=0x10001) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000), 0xc) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[@ANYBLOB='B'], 0x1) splice(r3, 0x0, r1, 0x0, 0xd86dac9, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000280)="f04ae0d27d087e3a55368725b79995004536209bdb852bc8ab5d6abfc204b96d8edd3ebe0b116d9a82e2d9c6664355da1a987027ea53b8d032adc5fe94e61a231cdf82c26293800bcae54b57c848213614a6c0af"}, 0x20) 08:29:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vlan1\x00', 0x400}) ioctl$TUNSETCARRIER(r0, 0x400454d4, &(0x7f00000000c0)=0x1) 08:29:35 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x2000000000000074, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) socketpair(0x1a, 0x2, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x5}], 0x1) 08:29:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vlan1\x00', 0x400}) ioctl$TUNSETCARRIER(r0, 0x400454d4, &(0x7f00000000c0)=0x1) 08:29:35 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x2000000000000074, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) socketpair(0x1a, 0x2, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x5}], 0x1) 08:29:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000000)={@void, @val, @mpls={[], @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @remote}, {0x0, 0x0, 0x8}}}}, 0xfdef) 08:29:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vlan1\x00', 0x400}) ioctl$TUNSETCARRIER(r0, 0x400454d4, &(0x7f00000000c0)=0x1) 08:29:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="0a4800002a000505d25a80758c63940d0124fc60100003400a000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 08:29:36 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "03007329bf"}, 0x9) recvmmsg(r0, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10100, 0x0) [ 215.454343][ T9856] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 215.467731][ T9856] netlink: 'syz-executor.3': attribute type 8 has an invalid length. [ 215.494060][ T9856] netlink: 16602 bytes leftover after parsing attributes in process `syz-executor.3'. 08:29:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vlan1\x00', 0x400}) ioctl$TUNSETCARRIER(r0, 0x400454d4, &(0x7f00000000c0)=0x1) 08:29:36 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "03007329bf"}, 0x9) recvmmsg(r0, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10100, 0x0) 08:29:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x258, 0xc8, 0x0, 0xc8, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@inet=@l2tp={{0x30, 'l2tp\x00'}, {0x0, 0x0, 0x0, 0x0, 0x10}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'syzkaller1\x00', 'caif0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2b8) 08:29:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000000)={@void, @val, @mpls={[], @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @remote}, {0x0, 0x0, 0x8}}}}, 0xfdef) [ 215.782082][ T9867] xt_l2tp: unknown flags: 10 08:29:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vlan1\x00', 0x400}) ioctl$TUNSETCARRIER(r0, 0x400454d4, &(0x7f00000000c0)=0x1) 08:29:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, &(0x7f0000001680)) 08:29:36 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "03007329bf"}, 0x9) recvmmsg(r0, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10100, 0x0) 08:29:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vlan1\x00', 0x400}) ioctl$TUNSETCARRIER(r0, 0x400454d4, &(0x7f00000000c0)=0x1) 08:29:36 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 08:29:36 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x9c) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 08:29:36 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "03007329bf"}, 0x9) recvmmsg(r0, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10100, 0x0) 08:29:36 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 08:29:36 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) 08:29:36 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 08:29:37 executing program 3: unshare(0x480) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) [ 216.565073][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 216.565089][ T27] audit: type=1804 audit(1583742577.144:31): pid=9921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir093689175/syzkaller.YYOSo6/10/memory.events" dev="sda1" ino=16556 res=1 [ 216.629678][ T27] audit: type=1800 audit(1583742577.154:32): pid=9921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16556 res=0 [ 216.691347][ T27] audit: type=1804 audit(1583742577.174:33): pid=9923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir093689175/syzkaller.YYOSo6/10/memory.events" dev="sda1" ino=16556 res=1 [ 216.737582][ T27] audit: type=1800 audit(1583742577.174:34): pid=9923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16556 res=0 [ 216.771980][ T9899] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 216.780744][ T9899] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.797615][ T9899] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 08:29:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f0000000000)={@void, @val, @mpls={[], @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @remote}, {0x0, 0x0, 0x8}}}}, 0xfdef) 08:29:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x10000, 0x2, 0x40, 0x1}, 0x3c) 08:29:37 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 08:29:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @dev, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 08:29:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$cgroup_int(r0, &(0x7f0000000000)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x3) 08:29:37 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) poll(&(0x7f0000000140)=[{r2, 0x120}], 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x120}], 0x1, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000280)=@file={0x0, './bus/file1\x00'}, 0x6e) 08:29:37 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x9c) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 08:29:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet6(r1, &(0x7f0000004f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 08:29:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c000000300027070000000000000000000000003800010034000100070001006374000024000280180001000000000000000000000000000000000000000000080007"], 0x1}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 217.489665][ T27] audit: type=1804 audit(1583742578.064:35): pid=9949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir461428953/syzkaller.StRCes/9/cgroup.controllers" dev="sda1" ino=16560 res=1 08:29:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) close(r1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'bridge_slave_1\x00', @random="01003a1e2410"}) [ 217.828248][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 217.842379][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 217.849851][ T9957] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.876128][ T9949] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 217.894675][ T9949] BUG: sleeping function called from invalid context at mm/slab.h:565 [ 217.903214][ T9949] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 9949, name: syz-executor.1 [ 217.912622][ T9949] 2 locks held by syz-executor.1/9949: [ 217.918087][ T9949] #0: ffffffff8a34eb80 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3f9/0xad0 [ 217.926967][ T9949] #1: ffffffff8a3961b8 (zones_lock){+...}, at: tcf_ct_flow_table_get+0xa3/0x1700 [ 217.936213][ T9949] Preemption disabled at: [ 217.936225][ T9949] [<0000000000000000>] 0x0 [ 217.945006][ T9949] CPU: 1 PID: 9949 Comm: syz-executor.1 Not tainted 5.6.0-rc3-syzkaller #0 [ 217.953582][ T9949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.963623][ T9949] Call Trace: [ 217.966915][ T9949] dump_stack+0x188/0x20d [ 217.971261][ T9949] ___might_sleep.cold+0x1f4/0x23d [ 217.976378][ T9949] kmem_cache_alloc_node_trace+0x272/0x790 [ 217.982190][ T9949] ? _raw_spin_unlock_irqrestore+0x9b/0xe0 [ 217.988001][ T9949] __kmalloc_node+0x38/0x60 [ 217.992507][ T9949] kvmalloc_node+0x61/0xf0 [ 217.996934][ T9949] bucket_table_alloc+0x8b/0x480 [ 218.001861][ T9949] rhashtable_init+0x3d2/0x750 [ 218.006624][ T9949] nf_flow_table_init+0x16d/0x310 [ 218.011647][ T9949] tcf_ct_flow_table_get+0xe33/0x1700 [ 218.017012][ T9949] ? tcf_ct_params_free+0x330/0x330 [ 218.022389][ T9949] ? memset+0x20/0x40 [ 218.026381][ T9949] ? memset+0x20/0x40 [ 218.030363][ T9949] tcf_ct_init+0xba4/0x18a6 [ 218.034916][ T9949] ? tcf_ct_flow_table_get+0x1700/0x1700 [ 218.040538][ T9949] ? find_held_lock+0x2d/0x110 [ 218.045326][ T9949] ? tc_lookup_action_n+0x1a/0xf0 [ 218.050345][ T9949] ? mark_lock+0xbc/0x1220 [ 218.054749][ T9949] ? tcf_action_init_1+0x697/0xa20 [ 218.059854][ T9949] ? tc_lookup_action_n+0xcd/0xf0 [ 218.064870][ T9949] tcf_action_init_1+0x697/0xa20 [ 218.069815][ T9949] ? tcf_action_dump_old+0x80/0x80 [ 218.074925][ T9949] ? memset+0x20/0x40 [ 218.078912][ T9949] ? is_bpf_image_address+0x1a9/0x280 [ 218.084302][ T9949] ? mark_lock+0xbc/0x1220 [ 218.088717][ T9949] tcf_action_init+0x1e9/0x2f0 [ 218.093487][ T9949] ? tcf_action_init_1+0xa20/0xa20 [ 218.098601][ T9949] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 218.104190][ T9949] ? mark_lock+0xbc/0x1220 [ 218.108633][ T9949] tcf_action_add+0xdb/0x370 [ 218.113241][ T9949] ? tca_action_gd+0x15b0/0x15b0 [ 218.118180][ T9949] ? find_held_lock+0x2d/0x110 [ 218.122954][ T9949] ? __mutex_lock+0xae5/0x13c0 08:29:38 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) poll(&(0x7f0000000140)=[{r2, 0x120}], 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x120}], 0x1, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000280)=@file={0x0, './bus/file1\x00'}, 0x6e) [ 218.127776][ T9949] ? nla_memcpy+0xa0/0xa0 [ 218.132121][ T9949] ? ns_capable_common+0xe2/0x100 [ 218.137151][ T9949] ? __nla_parse+0x2e/0x60 [ 218.141587][ T9949] tc_ctl_action+0x366/0x456 [ 218.146186][ T9949] ? tcf_action_add+0x370/0x370 [ 218.151126][ T9949] ? rtnetlink_rcv_msg+0x1d6/0xad0 [ 218.156255][ T9949] ? tcf_action_add+0x370/0x370 [ 218.161117][ T9949] rtnetlink_rcv_msg+0x44e/0xad0 [ 218.166072][ T9949] ? rtnl_bridge_getlink+0x870/0x870 [ 218.171368][ T9949] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 218.176665][ T9949] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 218.182486][ T9949] ? __phys_addr+0x9a/0x110 [ 218.186995][ T9949] netlink_rcv_skb+0x15a/0x410 [ 218.191754][ T9949] ? rtnl_bridge_getlink+0x870/0x870 [ 218.197054][ T9949] ? netlink_ack+0xa80/0xa80 [ 218.201682][ T9949] netlink_unicast+0x537/0x740 [ 218.206475][ T9949] ? netlink_attachskb+0x810/0x810 [ 218.207082][ T27] audit: type=1804 audit(1583742578.784:36): pid=9971 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir461428953/syzkaller.StRCes/9/cgroup.controllers" dev="sda1" ino=16560 res=1 [ 218.211587][ T9949] ? _copy_from_iter_full+0x25c/0x870 [ 218.211618][ T9949] ? __phys_addr_symbol+0x2c/0x70 [ 218.211634][ T9949] ? __check_object_size+0x171/0x437 [ 218.211661][ T9949] netlink_sendmsg+0x882/0xe10 [ 218.211684][ T9949] ? aa_af_perm+0x260/0x260 [ 218.211705][ T9949] ? netlink_unicast+0x740/0x740 [ 218.211736][ T9949] ? netlink_unicast+0x740/0x740 [ 218.211753][ T9949] sock_sendmsg+0xcf/0x120 [ 218.211772][ T9949] sock_no_sendpage+0xf8/0x140 [ 218.211789][ T9949] ? sock_kzfree_s+0x60/0x60 [ 218.211803][ T9949] ? lockdep_hardirqs_on+0x417/0x5d0 [ 218.211833][ T9949] ? find_held_lock+0x2d/0x110 [ 218.211851][ T9949] ? ext4_file_read_iter+0x449/0x600 [ 218.211877][ T9949] ? sock_kzfree_s+0x60/0x60 [ 218.211888][ T9949] kernel_sendpage+0x82/0xd0 [ 218.211909][ T9949] sock_sendpage+0x84/0xa0 [ 218.211925][ T9949] ? kernel_sendpage+0xd0/0xd0 [ 218.211937][ T9949] pipe_to_sendpage+0x2aa/0x380 [ 218.211957][ T9949] ? direct_splice_actor+0x160/0x160 [ 218.211977][ T9949] ? splice_from_pipe_next.part.0+0x29c/0x350 [ 218.212004][ T9949] __splice_from_pipe+0x3e6/0x7b0 [ 218.212030][ T9949] ? direct_splice_actor+0x160/0x160 [ 218.212051][ T9949] ? direct_splice_actor+0x160/0x160 [ 218.212069][ T9949] splice_from_pipe+0xd9/0x140 [ 218.212093][ T9949] ? splice_shrink_spd+0xc0/0xc0 [ 218.360238][ T9949] ? splice_from_pipe+0x140/0x140 [ 218.365263][ T9949] direct_splice_actor+0x115/0x160 [ 218.370364][ T9949] splice_direct_to_actor+0x38c/0x980 [ 218.375728][ T9949] ? generic_pipe_buf_nosteal+0x10/0x10 [ 218.381264][ T9949] ? do_splice_to+0x160/0x160 [ 218.385928][ T9949] ? security_file_permission+0x8a/0x370 [ 218.391553][ T9949] do_splice_direct+0x1a8/0x270 [ 218.396404][ T9949] ? splice_direct_to_actor+0x980/0x980 [ 218.401941][ T9949] ? security_file_permission+0x8a/0x370 [ 218.407568][ T9949] do_sendfile+0x549/0xc40 [ 218.411982][ T9949] ? do_compat_pwritev64+0x1b0/0x1b0 [ 218.417256][ T9949] ? put_timespec64+0xcb/0x120 [ 218.422003][ T9949] ? ns_to_kernel_old_timeval+0x100/0x100 [ 218.427712][ T9949] ? __x64_sys_futex+0x380/0x4f0 [ 218.432635][ T9949] __x64_sys_sendfile64+0x1cc/0x210 [ 218.437816][ T9949] ? __ia32_sys_sendfile+0x220/0x220 [ 218.443082][ T9949] ? __ia32_sys_clock_settime+0x260/0x260 [ 218.448806][ T9949] ? trace_hardirqs_off_caller+0x55/0x230 [ 218.454519][ T9949] do_syscall_64+0xf6/0x790 [ 218.459012][ T9949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.464885][ T9949] RIP: 0033:0x45c4a9 [ 218.468763][ T9949] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.488347][ T9949] RSP: 002b:00007f3748bb5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 218.496738][ T9949] RAX: ffffffffffffffda RBX: 00007f3748bb66d4 RCX: 000000000045c4a9 [ 218.504691][ T9949] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000006 [ 218.512768][ T9949] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 218.520730][ T9949] R10: 0000000100000001 R11: 0000000000000246 R12: 00000000ffffffff [ 218.528687][ T9949] R13: 00000000000008d1 R14: 00000000004cb3b0 R15: 000000000076bf2c 08:29:39 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth0_to_hsr\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x1c}}) [ 218.791755][ C1] [ 218.794121][ C1] ======================================================== [ 218.801291][ C1] WARNING: possible irq lock inversion dependency detected [ 218.808489][ C1] 5.6.0-rc3-syzkaller #0 Tainted: G W [ 218.815150][ C1] -------------------------------------------------------- [ 218.822337][ C1] ksoftirqd/1/16 just changed the state of lock: [ 218.828653][ C1] ffffffff8a3961b8 (zones_lock){+.-.}, at: tcf_ct_params_free+0x8a/0x330 [ 218.837063][ C1] but this lock took another, SOFTIRQ-unsafe lock in the past: [ 218.844575][ C1] (fs_reclaim){+.+.} [ 218.844581][ C1] [ 218.844581][ C1] [ 218.844581][ C1] and interrupts could create inverse lock ordering between them. [ 218.844581][ C1] [ 218.862859][ C1] [ 218.862859][ C1] other info that might help us debug this: [ 218.870892][ C1] Possible interrupt unsafe locking scenario: [ 218.870892][ C1] [ 218.879186][ C1] CPU0 CPU1 [ 218.884528][ C1] ---- ---- [ 218.889870][ C1] lock(fs_reclaim); [ 218.893839][ C1] local_irq_disable(); [ 218.900571][ C1] lock(zones_lock); [ 218.907072][ C1] lock(fs_reclaim); [ 218.913546][ C1] [ 218.916982][ C1] lock(zones_lock); [ 218.921123][ C1] [ 218.921123][ C1] *** DEADLOCK *** [ 218.921123][ C1] [ 218.929257][ C1] 1 lock held by ksoftirqd/1/16: [ 218.934171][ C1] #0: ffffffff897ac9c0 (rcu_callback){....}, at: rcu_core+0x525/0x12d0 [ 218.942497][ C1] [ 218.942497][ C1] the shortest dependencies between 2nd lock and 1st lock: [ 218.951935][ C1] -> (fs_reclaim){+.+.} { [ 218.956335][ C1] HARDIRQ-ON-W at: [ 218.960381][ C1] lock_acquire+0x197/0x420 [ 218.966683][ C1] fs_reclaim_acquire.part.0+0x20/0x30 [ 218.974008][ C1] kmem_cache_alloc_trace+0x29/0x7d0 [ 218.981097][ C1] alloc_workqueue_attrs+0x39/0xc0 [ 218.988012][ C1] workqueue_init+0x94/0x726 [ 218.994402][ C1] kernel_init_freeable+0x2b7/0x5ae [ 219.001405][ C1] kernel_init+0xd/0x1bb [ 219.007497][ C1] ret_from_fork+0x24/0x30 [ 219.013716][ C1] SOFTIRQ-ON-W at: [ 219.017775][ C1] lock_acquire+0x197/0x420 [ 219.024086][ C1] fs_reclaim_acquire.part.0+0x20/0x30 [ 219.031354][ C1] kmem_cache_alloc_trace+0x29/0x7d0 [ 219.038463][ C1] alloc_workqueue_attrs+0x39/0xc0 [ 219.045391][ C1] workqueue_init+0x94/0x726 [ 219.052829][ C1] kernel_init_freeable+0x2b7/0x5ae [ 219.059834][ C1] kernel_init+0xd/0x1bb [ 219.065877][ C1] ret_from_fork+0x24/0x30 [ 219.072088][ C1] INITIAL USE at: [ 219.076072][ C1] lock_acquire+0x197/0x420 [ 219.082289][ C1] fs_reclaim_acquire.part.0+0x20/0x30 [ 219.089457][ C1] kmem_cache_alloc_trace+0x29/0x7d0 [ 219.096457][ C1] alloc_workqueue_attrs+0x39/0xc0 [ 219.103284][ C1] workqueue_init+0x94/0x726 [ 219.109606][ C1] kernel_init_freeable+0x2b7/0x5ae [ 219.116517][ C1] kernel_init+0xd/0x1bb [ 219.122474][ C1] ret_from_fork+0x24/0x30 [ 219.128592][ C1] } [ 219.131160][ C1] ... key at: [] __fs_reclaim_map+0x0/0x40 [ 219.139104][ C1] ... acquired at: [ 219.142979][ C1] fs_reclaim_acquire.part.0+0x20/0x30 [ 219.148585][ C1] kmem_cache_alloc_node_trace+0x37/0x790 [ 219.154466][ C1] __kmalloc_node+0x38/0x60 [ 219.159123][ C1] kvmalloc_node+0x61/0xf0 [ 219.163689][ C1] bucket_table_alloc+0x8b/0x480 [ 219.168824][ C1] rhashtable_init+0x3d2/0x750 [ 219.173742][ C1] nf_flow_table_init+0x16d/0x310 [ 219.178931][ C1] tcf_ct_flow_table_get+0xe33/0x1700 [ 219.184459][ C1] tcf_ct_init+0xba4/0x18a6 [ 219.189167][ C1] tcf_action_init_1+0x697/0xa20 [ 219.194256][ C1] tcf_action_init+0x1e9/0x2f0 [ 219.199165][ C1] tcf_action_add+0xdb/0x370 [ 219.203904][ C1] tc_ctl_action+0x366/0x456 [ 219.208643][ C1] rtnetlink_rcv_msg+0x44e/0xad0 [ 219.213731][ C1] netlink_rcv_skb+0x15a/0x410 [ 219.218649][ C1] netlink_unicast+0x537/0x740 [ 219.223561][ C1] netlink_sendmsg+0x882/0xe10 [ 219.228471][ C1] sock_sendmsg+0xcf/0x120 [ 219.233044][ C1] sock_no_sendpage+0xf8/0x140 [ 219.237958][ C1] kernel_sendpage+0x82/0xd0 [ 219.242694][ C1] sock_sendpage+0x84/0xa0 [ 219.247309][ C1] pipe_to_sendpage+0x2aa/0x380 [ 219.252318][ C1] __splice_from_pipe+0x3e6/0x7b0 [ 219.257500][ C1] splice_from_pipe+0xd9/0x140 [ 219.262414][ C1] direct_splice_actor+0x115/0x160 [ 219.267672][ C1] splice_direct_to_actor+0x38c/0x980 [ 219.273193][ C1] do_splice_direct+0x1a8/0x270 [ 219.278204][ C1] do_sendfile+0x549/0xc40 [ 219.282769][ C1] __x64_sys_sendfile64+0x1cc/0x210 [ 219.288119][ C1] do_syscall_64+0xf6/0x790 [ 219.292774][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.298815][ C1] [ 219.301115][ C1] -> (zones_lock){+.-.} { [ 219.305432][ C1] HARDIRQ-ON-W at: [ 219.309391][ C1] lock_acquire+0x197/0x420 [ 219.315521][ C1] _raw_spin_lock_bh+0x2f/0x40 [ 219.321910][ C1] tcf_ct_flow_table_get+0xa3/0x1700 [ 219.328820][ C1] tcf_ct_init+0xba4/0x18a6 [ 219.334949][ C1] tcf_action_init_1+0x697/0xa20 [ 219.341515][ C1] tcf_action_init+0x1e9/0x2f0 [ 219.347919][ C1] tcf_action_add+0xdb/0x370 [ 219.354136][ C1] tc_ctl_action+0x366/0x456 [ 219.360362][ C1] rtnetlink_rcv_msg+0x44e/0xad0 [ 219.366944][ C1] netlink_rcv_skb+0x15a/0x410 [ 219.373336][ C1] netlink_unicast+0x537/0x740 [ 219.379740][ C1] netlink_sendmsg+0x882/0xe10 [ 219.386130][ C1] sock_sendmsg+0xcf/0x120 [ 219.392177][ C1] sock_no_sendpage+0xf8/0x140 [ 219.398571][ C1] kernel_sendpage+0x82/0xd0 [ 219.404787][ C1] sock_sendpage+0x84/0xa0 [ 219.410830][ C1] pipe_to_sendpage+0x2aa/0x380 [ 219.417305][ C1] __splice_from_pipe+0x3e6/0x7b0 [ 219.423956][ C1] splice_from_pipe+0xd9/0x140 [ 219.430343][ C1] direct_splice_actor+0x115/0x160 [ 219.437086][ C1] splice_direct_to_actor+0x38c/0x980 [ 219.444088][ C1] do_splice_direct+0x1a8/0x270 [ 219.450564][ C1] do_sendfile+0x549/0xc40 [ 219.456604][ C1] __x64_sys_sendfile64+0x1cc/0x210 [ 219.463429][ C1] do_syscall_64+0xf6/0x790 [ 219.469571][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.477101][ C1] IN-SOFTIRQ-W at: [ 219.481059][ C1] lock_acquire+0x197/0x420 [ 219.487189][ C1] _raw_spin_lock_bh+0x2f/0x40 [ 219.493581][ C1] tcf_ct_params_free+0x8a/0x330 [ 219.500142][ C1] rcu_core+0x5a4/0x12d0 [ 219.506025][ C1] __do_softirq+0x26c/0x99d [ 219.512155][ C1] run_ksoftirqd+0x89/0x100 [ 219.518292][ C1] smpboot_thread_fn+0x653/0x9e0 [ 219.524855][ C1] kthread+0x357/0x430 [ 219.530547][ C1] ret_from_fork+0x24/0x30 [ 219.536583][ C1] INITIAL USE at: [ 219.540457][ C1] lock_acquire+0x197/0x420 [ 219.546499][ C1] _raw_spin_lock_bh+0x2f/0x40 [ 219.552807][ C1] tcf_ct_flow_table_get+0xa3/0x1700 [ 219.559705][ C1] tcf_ct_init+0xba4/0x18a6 [ 219.565760][ C1] tcf_action_init_1+0x697/0xa20 [ 219.572252][ C1] tcf_action_init+0x1e9/0x2f0 [ 219.578569][ C1] tcf_action_add+0xdb/0x370 [ 219.584702][ C1] tc_ctl_action+0x366/0x456 [ 219.590886][ C1] rtnetlink_rcv_msg+0x44e/0xad0 [ 219.597368][ C1] netlink_rcv_skb+0x15a/0x410 [ 219.603820][ C1] netlink_unicast+0x537/0x740 [ 219.610156][ C1] netlink_sendmsg+0x882/0xe10 [ 219.616470][ C1] sock_sendmsg+0xcf/0x120 [ 219.622440][ C1] sock_no_sendpage+0xf8/0x140 [ 219.628742][ C1] kernel_sendpage+0x82/0xd0 [ 219.634882][ C1] sock_sendpage+0x84/0xa0 [ 219.640845][ C1] pipe_to_sendpage+0x2aa/0x380 [ 219.647237][ C1] __splice_from_pipe+0x3e6/0x7b0 [ 219.653811][ C1] splice_from_pipe+0xd9/0x140 [ 219.660127][ C1] direct_splice_actor+0x115/0x160 [ 219.666777][ C1] splice_direct_to_actor+0x38c/0x980 [ 219.673686][ C1] do_splice_direct+0x1a8/0x270 [ 219.680074][ C1] do_sendfile+0x549/0xc40 [ 219.686037][ C1] __x64_sys_sendfile64+0x1cc/0x210 [ 219.692789][ C1] do_syscall_64+0xf6/0x790 [ 219.698887][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.706320][ C1] } [ 219.708807][ C1] ... key at: [] zones_lock+0x18/0x31a0 [ 219.716406][ C1] ... acquired at: [ 219.720192][ C1] mark_lock+0x50e/0x1220 [ 219.724671][ C1] __lock_acquire+0x1a4e/0x3ca0 [ 219.729706][ C1] lock_acquire+0x197/0x420 [ 219.734362][ C1] _raw_spin_lock_bh+0x2f/0x40 [ 219.739275][ C1] tcf_ct_params_free+0x8a/0x330 [ 219.744362][ C1] rcu_core+0x5a4/0x12d0 [ 219.748751][ C1] __do_softirq+0x26c/0x99d [ 219.753416][ C1] run_ksoftirqd+0x89/0x100 [ 219.758081][ C1] smpboot_thread_fn+0x653/0x9e0 [ 219.763182][ C1] kthread+0x357/0x430 [ 219.767396][ C1] ret_from_fork+0x24/0x30 [ 219.771955][ C1] [ 219.774267][ C1] [ 219.774267][ C1] stack backtrace: [ 219.780135][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Tainted: G W 5.6.0-rc3-syzkaller #0 [ 219.789658][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.799688][ C1] Call Trace: [ 219.802973][ C1] dump_stack+0x188/0x20d [ 219.807280][ C1] check_usage_forwards.cold+0x20/0x29 [ 219.812724][ C1] ? check_usage_backwards+0x330/0x330 [ 219.818234][ C1] ? stack_trace_consume_entry+0x160/0x160 [ 219.824051][ C1] ? save_trace+0x42/0x890 [ 219.828449][ C1] mark_lock+0x50e/0x1220 [ 219.832762][ C1] ? check_usage_backwards+0x330/0x330 [ 219.838204][ C1] __lock_acquire+0x1a4e/0x3ca0 [ 219.843036][ C1] ? __kasan_slab_free+0xf7/0x140 [ 219.848038][ C1] ? mark_lock+0xbc/0x1220 [ 219.852438][ C1] ? mark_held_locks+0xe0/0xe0 [ 219.857186][ C1] ? __lock_acquire+0x80b/0x3ca0 [ 219.862118][ C1] lock_acquire+0x197/0x420 [ 219.866621][ C1] ? tcf_ct_params_free+0x8a/0x330 [ 219.871810][ C1] _raw_spin_lock_bh+0x2f/0x40 [ 219.876559][ C1] ? tcf_ct_params_free+0x8a/0x330 [ 219.881658][ C1] tcf_ct_params_free+0x8a/0x330 [ 219.886581][ C1] ? __rhashtable_remove_fast.constprop.0+0xeb0/0xeb0 [ 219.893330][ C1] ? lock_acquire+0x197/0x420 [ 219.897992][ C1] ? rcu_core+0x525/0x12d0 [ 219.902387][ C1] rcu_core+0x5a4/0x12d0 [ 219.906607][ C1] ? __rcu_read_unlock+0x700/0x700 [ 219.911712][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 219.917251][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 219.923221][ C1] __do_softirq+0x26c/0x99d [ 219.927706][ C1] ? takeover_tasklets+0x810/0x810 [ 219.932801][ C1] run_ksoftirqd+0x89/0x100 [ 219.937290][ C1] smpboot_thread_fn+0x653/0x9e0 08:29:40 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) poll(&(0x7f0000000140)=[{r2, 0x120}], 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x120}], 0x1, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000280)=@file={0x0, './bus/file1\x00'}, 0x6e) 08:29:40 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0x2) 08:29:40 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x9c) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 08:29:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c000000300027070000000000000000000000003800010034000100070001006374000024000280180001000000000000000000000000000000000000000000080007"], 0x1}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 08:29:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c000000300027070000000000000000000000003800010034000100070001006374000024000280180001000000000000000000000000000000000000000000080007"], 0x1}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 219.942211][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 219.948428][ C1] ? __kthread_parkme+0x10a/0x1c0 [ 219.953449][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 219.959667][ C1] kthread+0x357/0x430 [ 219.963711][ C1] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 219.969417][ C1] ret_from_fork+0x24/0x30 08:29:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c000000300027070000000000000000000000003800010034000100070001006374000024000280180001000000000000000000000000000000000000000000080007"], 0x1}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 08:29:40 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0x2) 08:29:40 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0x2) [ 220.176321][ T9995] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 220.192957][ T9995] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.200404][ T9995] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 08:29:40 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0x2) [ 220.333761][ T27] audit: type=1804 audit(1583742580.914:37): pid=9990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir461428953/syzkaller.StRCes/10/cgroup.controllers" dev="sda1" ino=16535 res=1 [ 220.377129][ T9990] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 220.391393][ T9990] BUG: sleeping function called from invalid context at mm/slab.h:565 [ 220.399589][ T9990] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 9990, name: syz-executor.1 [ 220.408978][ T9990] INFO: lockdep is turned off. [ 220.413757][ T9990] Preemption disabled at: [ 220.413769][ T9990] [<0000000000000000>] 0x0 [ 220.422530][ T9990] CPU: 0 PID: 9990 Comm: syz-executor.1 Tainted: G W 5.6.0-rc3-syzkaller #0 08:29:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) [ 220.432577][ T9990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.442628][ T9990] Call Trace: [ 220.445926][ T9990] dump_stack+0x188/0x20d [ 220.450263][ T9990] ___might_sleep.cold+0x1f4/0x23d [ 220.455384][ T9990] kmem_cache_alloc_node_trace+0x272/0x790 [ 220.461192][ T9990] ? _raw_spin_unlock_irqrestore+0x9b/0xe0 [ 220.467008][ T9990] ? __debug_object_init+0x4aa/0xe20 [ 220.472298][ T9990] ? do_raw_spin_lock+0x129/0x2e0 [ 220.477330][ T9990] __kmalloc_node+0x38/0x60 [ 220.481844][ T9990] kvmalloc_node+0x61/0xf0 [ 220.486266][ T9990] bucket_table_alloc+0x8b/0x480 [ 220.491206][ T9990] rhashtable_init+0x3d2/0x750 [ 220.495980][ T9990] nf_flow_table_init+0x16d/0x310 [ 220.501026][ T9990] tcf_ct_flow_table_get+0xe33/0x1700 [ 220.506409][ T9990] ? tcf_ct_params_free+0x330/0x330 [ 220.511614][ T9990] ? memset+0x20/0x40 [ 220.513739][ T27] audit: type=1804 audit(1583742580.944:38): pid=9989 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir612724534/syzkaller.ucTgDF/12/cgroup.controllers" dev="sda1" ino=16567 res=1 [ 220.515596][ T9990] ? memset+0x20/0x40 [ 220.515618][ T9990] tcf_ct_init+0xba4/0x18a6 [ 220.515635][ T9990] ? vprintk_func+0x81/0x17e [ 220.515655][ T9990] ? tcf_ct_flow_table_get+0x1700/0x1700 [ 220.559804][ T9990] ? _raw_spin_unlock_irqrestore+0x9b/0xe0 [ 220.565612][ T9990] ? mark_held_locks+0xe0/0xe0 [ 220.570388][ T9990] ? tc_lookup_action_n+0x1a/0xf0 [ 220.575412][ T9990] ? sd_init_command+0x205/0x34e0 [ 220.580443][ T9990] ? tcf_action_init_1+0x697/0xa20 [ 220.585592][ T9990] ? tc_lookup_action_n+0xcd/0xf0 [ 220.590620][ T9990] tcf_action_init_1+0x697/0xa20 [ 220.595570][ T9990] ? tcf_action_dump_old+0x80/0x80 [ 220.600691][ T9990] ? memset+0x20/0x40 [ 220.603381][ T27] audit: type=1804 audit(1583742581.004:39): pid=10002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir333582476/syzkaller.n1yIZu/5/cgroup.controllers" dev="sda1" ino=16574 res=1 [ 220.604686][ T9990] ? lock_downgrade+0x7f0/0x7f0 [ 220.604705][ T9990] tcf_action_init+0x1e9/0x2f0 [ 220.604732][ T9990] ? tcf_action_init_1+0xa20/0xa20 [ 220.644962][ T9990] ? kernel_text_address+0xe2/0x100 [ 220.650191][ T9990] ? skb_release_all+0x46/0x60 [ 220.654960][ T9990] ? save_stack+0x4c/0x80 [ 220.659296][ T9990] ? save_stack+0x1b/0x80 [ 220.663629][ T9990] ? __kasan_slab_free+0xf7/0x140 [ 220.668659][ T9990] tcf_action_add+0xdb/0x370 [ 220.673257][ T9990] ? tca_action_gd+0x15b0/0x15b0 [ 220.678199][ T9990] ? __x64_sys_sendfile64+0x1cc/0x210 08:29:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) [ 220.683575][ T9990] ? mark_held_locks+0xe0/0xe0 [ 220.688364][ T9990] ? nla_memcpy+0xa0/0xa0 [ 220.692705][ T9990] ? ns_capable_common+0xe2/0x100 [ 220.697735][ T9990] ? __nla_parse+0x2e/0x60 [ 220.702158][ T9990] tc_ctl_action+0x366/0x456 [ 220.706788][ T9990] ? tcf_action_add+0x370/0x370 [ 220.711644][ T9990] ? lock_acquire+0x197/0x420 [ 220.716324][ T9990] ? rtnetlink_rcv_msg+0x1d6/0xad0 [ 220.721445][ T9990] ? tcf_action_add+0x370/0x370 [ 220.726329][ T9990] rtnetlink_rcv_msg+0x44e/0xad0 08:29:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) [ 220.731275][ T9990] ? rtnl_bridge_getlink+0x870/0x870 [ 220.736570][ T9990] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 220.741863][ T9990] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 220.747677][ T9990] ? __phys_addr+0x9a/0x110 [ 220.752191][ T9990] netlink_rcv_skb+0x15a/0x410 [ 220.756963][ T9990] ? rtnl_bridge_getlink+0x870/0x870 [ 220.762265][ T9990] ? netlink_ack+0xa80/0xa80 [ 220.766901][ T9990] ? netlink_deliver_tap+0x236/0xb50 [ 220.772195][ T9990] netlink_unicast+0x537/0x740 [ 220.776972][ T9990] ? netlink_attachskb+0x810/0x810 [ 220.782088][ T9990] ? _copy_from_iter_full+0x25c/0x870 [ 220.787473][ T9990] ? __phys_addr_symbol+0x2c/0x70 [ 220.792507][ T9990] ? __check_object_size+0x171/0x437 [ 220.797809][ T9990] netlink_sendmsg+0x882/0xe10 [ 220.802583][ T9990] ? aa_af_perm+0x260/0x260 [ 220.807097][ T9990] ? netlink_unicast+0x740/0x740 [ 220.812049][ T9990] ? netlink_unicast+0x740/0x740 [ 220.816998][ T9990] sock_sendmsg+0xcf/0x120 [ 220.821423][ T9990] sock_no_sendpage+0xf8/0x140 [ 220.826190][ T9990] ? sock_kzfree_s+0x60/0x60 [ 220.830791][ T9990] ? iomap_dio_rw+0x64b/0x1140 [ 220.835566][ T9990] ? sock_kzfree_s+0x60/0x60 [ 220.840154][ T9990] kernel_sendpage+0x82/0xd0 [ 220.844756][ T9990] sock_sendpage+0x84/0xa0 [ 220.849176][ T9990] ? kernel_sendpage+0xd0/0xd0 [ 220.853942][ T9990] pipe_to_sendpage+0x2aa/0x380 [ 220.858801][ T9990] ? direct_splice_actor+0x160/0x160 [ 220.864094][ T9990] ? down_read_non_owner+0x470/0x470 [ 220.869385][ T9990] ? splice_from_pipe_next.part.0+0x29c/0x350 [ 220.875456][ T9990] __splice_from_pipe+0x3e6/0x7b0 [ 220.880498][ T9990] ? direct_splice_actor+0x160/0x160 08:29:41 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) poll(&(0x7f0000000140)=[{r2, 0x120}], 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x120}], 0x1, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000280)=@file={0x0, './bus/file1\x00'}, 0x6e) 08:29:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) 08:29:41 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x9c) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) [ 220.885788][ T9990] ? direct_splice_actor+0x160/0x160 [ 220.891079][ T9990] splice_from_pipe+0xd9/0x140 [ 220.895854][ T9990] ? splice_shrink_spd+0xc0/0xc0 [ 220.900805][ T9990] ? splice_from_pipe+0x140/0x140 [ 220.905834][ T9990] direct_splice_actor+0x115/0x160 [ 220.910952][ T9990] splice_direct_to_actor+0x38c/0x980 [ 220.916330][ T9990] ? mark_held_locks+0xe0/0xe0 [ 220.921103][ T9990] ? generic_pipe_buf_nosteal+0x10/0x10 [ 220.926653][ T9990] ? do_splice_to+0x160/0x160 [ 220.931332][ T9990] ? security_file_permission+0x8a/0x370 [ 220.936972][ T9990] do_splice_direct+0x1a8/0x270 [ 220.941833][ T9990] ? splice_direct_to_actor+0x980/0x980 [ 220.947390][ T9990] ? security_file_permission+0x8a/0x370 [ 220.953032][ T9990] do_sendfile+0x549/0xc40 [ 220.957456][ T9990] ? do_compat_pwritev64+0x1b0/0x1b0 [ 220.962744][ T9990] ? put_timespec64+0xcb/0x120 [ 220.967624][ T9990] ? ns_to_kernel_old_timeval+0x100/0x100 [ 220.973352][ T9990] ? __x64_sys_futex+0x380/0x4f0 [ 220.978298][ T9990] __x64_sys_sendfile64+0x1cc/0x210 [ 220.983500][ T9990] ? __ia32_sys_sendfile+0x220/0x220 [ 220.988784][ T9990] ? __ia32_sys_clock_settime+0x260/0x260 [ 220.994509][ T9990] ? trace_hardirqs_off_caller+0x55/0x230 [ 221.000237][ T9990] do_syscall_64+0xf6/0x790 [ 221.004748][ T9990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.010636][ T9990] RIP: 0033:0x45c4a9 [ 221.014529][ T9990] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 221.034132][ T9990] RSP: 002b:00007f3748bb5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 221.042551][ T9990] RAX: ffffffffffffffda RBX: 00007f3748bb66d4 RCX: 000000000045c4a9 [ 221.050526][ T9990] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000006 [ 221.058499][ T9990] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 221.066473][ T9990] R10: 0000000100000001 R11: 0000000000000246 R12: 00000000ffffffff [ 221.074450][ T9990] R13: 00000000000008d1 R14: 00000000004cb3b0 R15: 000000000076bf2c [ 221.106405][ T9989] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 221.117847][T10002] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 221.190931][T10044] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:29:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c000000300027070000000000000000000000003800010034000100070001006374000024000280180001000000000000000000000000000000000000000000080007"], 0x1}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 08:29:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) 08:29:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c000000300027070000000000000000000000003800010034000100070001006374000024000280180001000000000000000000000000000000000000000000080007"], 0x1}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 08:29:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c000000300027070000000000000000000000003800010034000100070001006374000024000280180001000000000000000000000000000000000000000000080007"], 0x1}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 221.256142][T10044] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 08:29:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) [ 221.351600][T10044] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 221.497221][ T27] audit: type=1804 audit(1583742582.074:40): pid=10056 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir612724534/syzkaller.ucTgDF/13/cgroup.controllers" dev="sda1" ino=16535 res=1 [ 221.531018][T10062] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 221.549927][T10062] BUG: sleeping function called from invalid context at mm/slab.h:565 [ 221.558177][T10062] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 10062, name: syz-executor.4 [ 221.567657][T10062] INFO: lockdep is turned off. [ 221.572548][T10062] Preemption disabled at: [ 221.572560][T10062] [<0000000000000000>] 0x0 [ 221.581463][T10062] CPU: 1 PID: 10062 Comm: syz-executor.4 Tainted: G W 5.6.0-rc3-syzkaller #0 [ 221.591535][T10062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.601598][T10062] Call Trace: [ 221.604901][T10062] dump_stack+0x188/0x20d [ 221.609346][T10062] ___might_sleep.cold+0x1f4/0x23d [ 221.614468][T10062] kmem_cache_alloc_node_trace+0x272/0x790 [ 221.620283][T10062] ? _raw_spin_unlock_irqrestore+0x9b/0xe0 [ 221.626098][T10062] ? __debug_object_init+0x4aa/0xe20 [ 221.631393][T10062] __kmalloc_node+0x38/0x60 [ 221.635905][T10062] kvmalloc_node+0x61/0xf0 [ 221.640324][T10062] bucket_table_alloc+0x8b/0x480 [ 221.645287][T10062] rhashtable_init+0x3d2/0x750 [ 221.650061][T10062] nf_flow_table_init+0x16d/0x310 [ 221.655087][T10062] tcf_ct_flow_table_get+0xe33/0x1700 [ 221.660471][T10062] ? tcf_ct_params_free+0x330/0x330 [ 221.665677][T10062] ? memset+0x20/0x40 [ 221.668966][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 221.668978][ T27] audit: type=1804 audit(1583742582.244:42): pid=10068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir461428953/syzkaller.StRCes/11/cgroup.controllers" dev="sda1" ino=16584 res=1 [ 221.669660][T10062] ? memset+0x20/0x40 [ 221.669683][T10062] tcf_ct_init+0xba4/0x18a6 [ 221.669698][T10062] ? vprintk_func+0x81/0x17e [ 221.669717][T10062] ? tcf_ct_flow_table_get+0x1700/0x1700 [ 221.719927][T10062] ? _raw_spin_unlock_irqrestore+0x9b/0xe0 [ 221.725737][T10062] ? mark_held_locks+0xe0/0xe0 [ 221.730520][T10062] ? tc_lookup_action_n+0x1a/0xf0 [ 221.735551][T10062] ? sd_init_command+0x205/0x34e0 [ 221.740575][T10062] ? tcf_action_init_1+0x697/0xa20 [ 221.745688][T10062] ? tc_lookup_action_n+0xcd/0xf0 [ 221.750719][T10062] tcf_action_init_1+0x697/0xa20 [ 221.755669][T10062] ? tcf_action_dump_old+0x80/0x80 [ 221.760787][T10062] ? memset+0x20/0x40 [ 221.764785][T10062] ? lock_downgrade+0x7f0/0x7f0 [ 221.769642][T10062] tcf_action_init+0x1e9/0x2f0 [ 221.774414][T10062] ? tcf_action_init_1+0xa20/0xa20 [ 221.779530][T10062] ? kernel_text_address+0xe2/0x100 [ 221.784751][T10062] ? skb_release_all+0x46/0x60 [ 221.789522][T10062] ? save_stack+0x4c/0x80 [ 221.793881][T10062] ? save_stack+0x1b/0x80 08:29:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) [ 221.798214][T10062] ? __kasan_slab_free+0xf7/0x140 [ 221.803245][T10062] tcf_action_add+0xdb/0x370 [ 221.807845][T10062] ? tca_action_gd+0x15b0/0x15b0 [ 221.812788][T10062] ? __x64_sys_sendfile64+0x1cc/0x210 [ 221.818160][T10062] ? mark_held_locks+0xe0/0xe0 [ 221.822948][T10062] ? nla_memcpy+0xa0/0xa0 [ 221.827281][T10062] ? ns_capable_common+0xe2/0x100 [ 221.832307][T10062] ? __nla_parse+0x2e/0x60 [ 221.836729][T10062] tc_ctl_action+0x366/0x456 [ 221.841324][T10062] ? tcf_action_add+0x370/0x370 [ 221.846187][T10062] ? lock_acquire+0x197/0x420 [ 221.850861][T10062] ? rtnetlink_rcv_msg+0x1d6/0xad0 [ 221.855973][T10062] ? tcf_action_add+0x370/0x370 [ 221.860814][T10062] rtnetlink_rcv_msg+0x44e/0xad0 [ 221.865753][T10062] ? rtnl_bridge_getlink+0x870/0x870 [ 221.871040][T10062] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 221.876330][T10062] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 221.882159][T10062] ? __phys_addr+0x9a/0x110 [ 221.886677][T10062] netlink_rcv_skb+0x15a/0x410 [ 221.891443][T10062] ? rtnl_bridge_getlink+0x870/0x870 [ 221.896731][T10062] ? netlink_ack+0xa80/0xa80 [ 221.901329][T10062] ? netlink_deliver_tap+0x236/0xb50 [ 221.906621][T10062] netlink_unicast+0x537/0x740 [ 221.911389][T10062] ? netlink_attachskb+0x810/0x810 [ 221.916505][T10062] ? _copy_from_iter_full+0x25c/0x870 [ 221.921886][T10062] ? __phys_addr_symbol+0x2c/0x70 [ 221.926909][T10062] ? __check_object_size+0x171/0x437 [ 221.932180][T10062] netlink_sendmsg+0x882/0xe10 [ 221.936928][T10062] ? aa_af_perm+0x260/0x260 [ 221.941421][T10062] ? netlink_unicast+0x740/0x740 [ 221.946353][T10062] ? netlink_unicast+0x740/0x740 [ 221.951279][T10062] sock_sendmsg+0xcf/0x120 [ 221.956124][T10062] sock_no_sendpage+0xf8/0x140 [ 221.960901][T10062] ? sock_kzfree_s+0x60/0x60 [ 221.965490][T10062] ? iomap_dio_rw+0x64b/0x1140 [ 221.970237][T10062] ? sock_kzfree_s+0x60/0x60 [ 221.974815][T10062] kernel_sendpage+0x82/0xd0 [ 221.979398][T10062] sock_sendpage+0x84/0xa0 [ 221.983825][T10062] ? kernel_sendpage+0xd0/0xd0 [ 221.988578][T10062] pipe_to_sendpage+0x2aa/0x380 [ 221.993415][T10062] ? direct_splice_actor+0x160/0x160 [ 221.998678][T10062] ? down_read_non_owner+0x470/0x470 [ 222.003941][T10062] ? splice_from_pipe_next.part.0+0x29c/0x350 [ 222.009987][T10062] __splice_from_pipe+0x3e6/0x7b0 [ 222.014996][T10062] ? direct_splice_actor+0x160/0x160 [ 222.020259][T10062] ? direct_splice_actor+0x160/0x160 [ 222.025526][T10062] splice_from_pipe+0xd9/0x140 [ 222.030271][T10062] ? splice_shrink_spd+0xc0/0xc0 [ 222.035202][T10062] ? splice_from_pipe+0x140/0x140 [ 222.040224][T10062] direct_splice_actor+0x115/0x160 [ 222.045373][T10062] splice_direct_to_actor+0x38c/0x980 [ 222.050724][T10062] ? mark_held_locks+0xe0/0xe0 [ 222.055475][T10062] ? generic_pipe_buf_nosteal+0x10/0x10 [ 222.061000][T10062] ? do_splice_to+0x160/0x160 [ 222.065713][T10062] ? security_file_permission+0x8a/0x370 [ 222.071328][T10062] do_splice_direct+0x1a8/0x270 [ 222.076200][T10062] ? splice_direct_to_actor+0x980/0x980 [ 222.081740][T10062] ? security_file_permission+0x8a/0x370 [ 222.087480][T10062] do_sendfile+0x549/0xc40 [ 222.091899][T10062] ? do_compat_pwritev64+0x1b0/0x1b0 [ 222.097193][T10062] ? put_timespec64+0xcb/0x120 [ 222.101946][T10062] ? ns_to_kernel_old_timeval+0x100/0x100 [ 222.107654][T10062] ? __x64_sys_futex+0x380/0x4f0 [ 222.112573][T10062] __x64_sys_sendfile64+0x1cc/0x210 [ 222.117749][T10062] ? __ia32_sys_sendfile+0x220/0x220 [ 222.123018][T10062] ? __ia32_sys_clock_settime+0x260/0x260 [ 222.128729][T10062] ? trace_hardirqs_off_caller+0x55/0x230 [ 222.134434][T10062] do_syscall_64+0xf6/0x790 [ 222.138917][T10062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.144805][T10062] RIP: 0033:0x45c4a9 [ 222.148681][T10062] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 222.168270][T10062] RSP: 002b:00007f3771ba1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 222.176665][T10062] RAX: ffffffffffffffda RBX: 00007f3771ba26d4 RCX: 000000000045c4a9 [ 222.184618][T10062] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000006 [ 222.192580][T10062] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 08:29:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) 08:29:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) [ 222.200544][T10062] R10: 0000000100000001 R11: 0000000000000246 R12: 00000000ffffffff [ 222.208496][T10062] R13: 00000000000008d1 R14: 00000000004cb3b0 R15: 000000000076bf2c [ 222.223198][T10068] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! 08:29:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) [ 222.251283][T10056] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 222.283369][T10068] File: /root/syzkaller-testdir461428953/syzkaller.StRCes/11/cgroup.controllers PID: 10068 Comm: syz-executor.1 08:29:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) 08:29:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) [ 222.309448][T10068] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 08:29:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c000000300027070000000000000000000000003800010034000100070001006374000024000280180001000000000000000000000000000000000000000000080007"], 0x1}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 08:29:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) 08:29:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) 08:29:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c000000300027070000000000000000000000003800010034000100070001006374000024000280180001000000000000000000000000000000000000000000080007"], 0x1}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 08:29:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c000000300027070000000000000000000000003800010034000100070001006374000024000280180001000000000000000000000000000000000000000000080007"], 0x1}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 08:29:43 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) 08:29:43 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) recvfrom(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 08:29:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x83, 0x5, 0x103}, 0x3c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="5cebf349ed50f63d2420dbf8a2955fff1a7bd307c11bdb776377ae98594090fefcfe34a7c89b0c2f4b0ccf0906063fd74bbd9c70203777ff44851e9785b6af4f640b3cec4b9219f3eb8d604236786debc04a0b1edc44a769715c0169739f5aad44056872167e97692d360179c7fe3a20a0e73899fe67b6a2159aa0d65b151b0c9683c5c1f6e9da7f1c2fae4cd8e12f7294e06b5ecbed", &(0x7f0000000240)="913ffbc5baf38ff302a2ee35c1530ecc7d1edd495dc987a0cbe5ebedff33f3f1af0b0577182cf23a0e50ce17cd614d42658d60d2c62c6a044692333fff1b49c275efc38f1375a43ecb89e1b029e43b398d6bf5ea67d81724fe9065b5c3aca7c4f1d4abdb26159fe2c7be9a789a70161fc90cecd46c1a64f34750688482f94ef09e18a126174341b312ce23fa150ee08333d194abb451e594a313c90ac53f8d77", 0x6}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@initdev}, &(0x7f00000003c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) write$cgroup_pid(r2, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) getsockopt$inet6_mreq(r2, 0x29, 0x8, &(0x7f0000000400)={@remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x14) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0x396) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000880)={'team0\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000008c0)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r6, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r7, &(0x7f0000000080)=0xffffffffffffffff, 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xffffffffffffff9a) 08:29:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="a000000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000080001200080001007674693674000200700004000000000008000200000000000800030000000000080006000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800020000000800fdff030000000000080004007f000001080005000000000008000400000000000800060000000000080006000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000"], 0xa0}}, 0x0) 08:29:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="a000000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000080001200080001007674693674000200700004000000000008000200000000000800030000000000080006000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800020000000800fdff030000000000080004007f000001080005000000000008000400000000000800060000000000080006000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000"], 0xa0}}, 0x0) [ 222.893921][ T27] audit: type=1804 audit(1583742583.474:43): pid=10125 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir461428953/syzkaller.StRCes/12/cgroup.controllers" dev="sda1" ino=16543 res=1 08:29:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_opts(r0, 0x29, 0x1, 0x0, &(0x7f0000000440)) [ 222.956821][ T27] audit: type=1804 audit(1583742583.524:44): pid=10134 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir612724534/syzkaller.ucTgDF/14/cgroup.controllers" dev="sda1" ino=16587 res=1 [ 222.990964][T10117] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 223.024011][T10117] BUG: sleeping function called from invalid context at mm/slab.h:565 [ 223.032267][T10117] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 10117, name: syz-executor.4 [ 223.035702][ T27] audit: type=1804 audit(1583742583.534:45): pid=10117 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir333582476/syzkaller.n1yIZu/7/cgroup.controllers" dev="sda1" ino=16585 res=1 [ 223.041745][T10117] INFO: lockdep is turned off. [ 223.041749][T10117] Preemption disabled at: [ 223.041760][T10117] [<0000000000000000>] 0x0 [ 223.041784][T10117] CPU: 1 PID: 10117 Comm: syz-executor.4 Tainted: G W 5.6.0-rc3-syzkaller #0 [ 223.041791][T10117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.041795][T10117] Call Trace: [ 223.041815][T10117] dump_stack+0x188/0x20d [ 223.041837][T10117] ___might_sleep.cold+0x1f4/0x23d [ 223.113687][T10117] kmem_cache_alloc_node_trace+0x272/0x790 08:29:43 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @dev, 0xe8000000}], 0x1c) [ 223.119512][T10117] ? _raw_spin_unlock_irqrestore+0x9b/0xe0 [ 223.125325][T10117] ? __debug_object_init+0x4aa/0xe20 [ 223.130616][T10117] ? netlink_sendmsg+0x882/0xe10 [ 223.135560][T10117] __kmalloc_node+0x38/0x60 [ 223.140069][T10117] kvmalloc_node+0x61/0xf0 [ 223.144515][T10117] bucket_table_alloc+0x8b/0x480 [ 223.149482][T10117] rhashtable_init+0x3d2/0x750 [ 223.154287][T10117] nf_flow_table_init+0x16d/0x310 [ 223.159318][T10117] tcf_ct_flow_table_get+0xe33/0x1700 [ 223.164699][T10117] ? tcf_ct_params_free+0x330/0x330 [ 223.169915][T10117] ? memset+0x20/0x40 08:29:43 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @dev, 0xe8000000}], 0x1c) [ 223.173905][T10117] ? memset+0x20/0x40 [ 223.177899][T10117] tcf_ct_init+0xba4/0x18a6 [ 223.182407][T10117] ? vprintk_func+0x81/0x17e [ 223.187006][T10117] ? tcf_ct_flow_table_get+0x1700/0x1700 [ 223.192648][T10117] ? _raw_spin_unlock_irqrestore+0x9b/0xe0 [ 223.198474][T10117] ? mark_held_locks+0xe0/0xe0 [ 223.203250][T10117] ? tc_lookup_action_n+0x1a/0xf0 [ 223.208279][T10117] ? sd_init_command+0x205/0x34e0 [ 223.213311][T10117] ? tcf_action_init_1+0x697/0xa20 [ 223.218432][T10117] ? tc_lookup_action_n+0xcd/0xf0 [ 223.223866][T10117] tcf_action_init_1+0x697/0xa20 [ 223.228808][T10117] ? tcf_action_dump_old+0x80/0x80 [ 223.233924][T10117] ? memset+0x20/0x40 [ 223.237917][T10117] ? lock_downgrade+0x7f0/0x7f0 [ 223.242771][T10117] tcf_action_init+0x1e9/0x2f0 [ 223.247545][T10117] ? tcf_action_init_1+0xa20/0xa20 [ 223.252663][T10117] ? kernel_text_address+0xe2/0x100 [ 223.257883][T10117] ? skb_release_all+0x46/0x60 [ 223.262656][T10117] ? save_stack+0x4c/0x80 [ 223.266985][T10117] ? save_stack+0x1b/0x80 08:29:43 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @dev, 0xe8000000}], 0x1c) 08:29:43 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @dev, 0xe8000000}], 0x1c) [ 223.271317][T10117] ? __kasan_slab_free+0xf7/0x140 [ 223.276343][T10117] tcf_action_add+0xdb/0x370 [ 223.280939][T10117] ? tca_action_gd+0x15b0/0x15b0 [ 223.285890][T10117] ? __x64_sys_sendfile64+0x1cc/0x210 [ 223.291268][T10117] ? mark_held_locks+0xe0/0xe0 [ 223.296057][T10117] ? nla_memcpy+0xa0/0xa0 [ 223.300395][T10117] ? ns_capable_common+0xe2/0x100 [ 223.305423][T10117] ? __nla_parse+0x2e/0x60 [ 223.309842][T10117] tc_ctl_action+0x366/0x456 [ 223.314435][T10117] ? tcf_action_add+0x370/0x370 [ 223.319290][T10117] ? lock_acquire+0x197/0x420 [ 223.324603][T10117] ? rtnetlink_rcv_msg+0x1d6/0xad0 [ 223.329720][T10117] ? tcf_action_add+0x370/0x370 [ 223.334605][T10117] rtnetlink_rcv_msg+0x44e/0xad0 [ 223.339548][T10117] ? rtnl_bridge_getlink+0x870/0x870 [ 223.344835][T10117] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 223.350125][T10117] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 223.355937][T10117] ? __phys_addr+0x9a/0x110 [ 223.360446][T10117] netlink_rcv_skb+0x15a/0x410 [ 223.365212][T10117] ? rtnl_bridge_getlink+0x870/0x870 [ 223.370502][T10117] ? netlink_ack+0xa80/0xa80 [ 223.375096][T10117] ? netlink_deliver_tap+0x236/0xb50 [ 223.380380][T10117] netlink_unicast+0x537/0x740 [ 223.385152][T10117] ? netlink_attachskb+0x810/0x810 [ 223.390271][T10117] ? _copy_from_iter_full+0x25c/0x870 [ 223.395648][T10117] ? __phys_addr_symbol+0x2c/0x70 [ 223.400679][T10117] ? __check_object_size+0x171/0x437 [ 223.405979][T10117] netlink_sendmsg+0x882/0xe10 [ 223.410753][T10117] ? aa_af_perm+0x260/0x260 [ 223.415257][T10117] ? netlink_unicast+0x740/0x740 [ 223.420863][T10117] ? netlink_unicast+0x740/0x740 [ 223.425808][T10117] sock_sendmsg+0xcf/0x120 [ 223.430230][T10117] sock_no_sendpage+0xf8/0x140 [ 223.435006][T10117] ? sock_kzfree_s+0x60/0x60 [ 223.439607][T10117] ? iomap_dio_rw+0x64b/0x1140 [ 223.444387][T10117] ? sock_kzfree_s+0x60/0x60 [ 223.448976][T10117] kernel_sendpage+0x82/0xd0 [ 223.453570][T10117] sock_sendpage+0x84/0xa0 [ 223.457991][T10117] ? kernel_sendpage+0xd0/0xd0 [ 223.462754][T10117] pipe_to_sendpage+0x2aa/0x380 [ 223.467612][T10117] ? direct_splice_actor+0x160/0x160 [ 223.472900][T10117] ? down_read_non_owner+0x470/0x470 [ 223.478187][T10117] ? splice_from_pipe_next.part.0+0x29c/0x350 [ 223.484249][T10117] ? mark_held_locks+0xe0/0xe0 [ 223.488998][T10117] __splice_from_pipe+0x3e6/0x7b0 [ 223.494026][T10117] ? direct_splice_actor+0x160/0x160 [ 223.499344][T10117] ? direct_splice_actor+0x160/0x160 [ 223.504613][T10117] splice_from_pipe+0xd9/0x140 [ 223.509371][T10117] ? splice_shrink_spd+0xc0/0xc0 [ 223.514300][T10117] ? splice_from_pipe+0x140/0x140 [ 223.519303][T10117] direct_splice_actor+0x115/0x160 [ 223.524472][T10117] splice_direct_to_actor+0x38c/0x980 [ 223.529862][T10117] ? mark_held_locks+0xe0/0xe0 [ 223.534631][T10117] ? generic_pipe_buf_nosteal+0x10/0x10 [ 223.540165][T10117] ? do_splice_to+0x160/0x160 [ 223.544826][T10117] ? security_file_permission+0x8a/0x370 [ 223.550439][T10117] do_splice_direct+0x1a8/0x270 [ 223.555273][T10117] ? splice_direct_to_actor+0x980/0x980 [ 223.560809][T10117] ? security_file_permission+0x8a/0x370 [ 223.566439][T10117] do_sendfile+0x549/0xc40 [ 223.570852][T10117] ? do_compat_pwritev64+0x1b0/0x1b0 [ 223.576120][T10117] ? put_timespec64+0xcb/0x120 [ 223.580864][T10117] ? ns_to_kernel_old_timeval+0x100/0x100 [ 223.586563][T10117] ? __x64_sys_futex+0x380/0x4f0 [ 223.591484][T10117] __x64_sys_sendfile64+0x1cc/0x210 [ 223.596677][T10117] ? __ia32_sys_sendfile+0x220/0x220 [ 223.602055][T10117] ? __ia32_sys_clock_settime+0x260/0x260 [ 223.607771][T10117] ? trace_hardirqs_off_caller+0x55/0x230 [ 223.613481][T10117] do_syscall_64+0xf6/0x790 [ 223.617969][T10117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.623840][T10117] RIP: 0033:0x45c4a9 [ 223.627712][T10117] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 223.647294][T10117] RSP: 002b:00007f3771ba1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 223.655692][T10117] RAX: ffffffffffffffda RBX: 00007f3771ba26d4 RCX: 000000000045c4a9 [ 223.663662][T10117] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000006 08:29:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b200000000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x38, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x68}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}], 0x4924924924924b3, 0x0) [ 223.671616][T10117] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 223.679573][T10117] R10: 0000000100000001 R11: 0000000000000246 R12: 00000000ffffffff [ 223.687533][T10117] R13: 00000000000008d1 R14: 00000000004cb3b0 R15: 000000000076bf2c 08:29:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xca, &(0x7f0000000100)={{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 08:29:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r10, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc900000"], 0x3}}, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=@gcm_128={{0x304}, "4338478095a8f4c2", "55b84d6a53c2da45ac672bb6150ca37a", 'LO*4', "290a9f74bbdc625c"}, 0x28) 08:29:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r3, @ANYBLOB="0000000000000027280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x401, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x101}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x60}}, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r4, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 08:29:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="a000000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000080001200080001007674693674000200700004000000000008000200000000000800030000000000080006000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800020000000800fdff030000000000080004007f000001080005000000000008000400000000000800060000000000080006000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000"], 0xa0}}, 0x0) 08:29:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b200000000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x38, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x68}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}], 0x4924924924924b3, 0x0) 08:29:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b200000000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x38, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x68}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}], 0x4924924924924b3, 0x0) [ 224.041605][T10166] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 08:29:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xca, &(0x7f0000000100)={{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 08:29:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b200000000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x38, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x68}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}], 0x4924924924924b3, 0x0) 08:29:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="a000000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000080001200080001007674693674000200700004000000000008000200000000000800030000000000080006000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800020000000800fdff030000000000080004007f000001080005000000000008000400000000000800060000000000080006000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000"], 0xa0}}, 0x0) [ 224.234785][T10170] device bridge_slave_0 left promiscuous mode [ 224.249134][T10170] bridge0: port 1(bridge_slave_0) entered disabled state 08:29:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xca, &(0x7f0000000100)={{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 08:29:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r3, @ANYBLOB="0000000000000027280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x401, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x101}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x60}}, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r4, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 08:29:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b200000000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x38, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x68}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}], 0x4924924924924b3, 0x0) 08:29:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r10, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc900000"], 0x3}}, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=@gcm_128={{0x304}, "4338478095a8f4c2", "55b84d6a53c2da45ac672bb6150ca37a", 'LO*4', "290a9f74bbdc625c"}, 0x28) 08:29:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b200000000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x38, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x68}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}], 0x4924924924924b3, 0x0) [ 224.918148][T10204] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 08:29:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xca, &(0x7f0000000100)={{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 08:29:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b200000000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x38, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x68}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}], 0x4924924924924b3, 0x0) 08:29:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b200000000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x38, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x68}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000017010000020000000000000015dc91768c78ba00b50b7a5e4e7907526d7c7c8aee968a562b00cb905e1826a8f9ee0ac480576a7134801fc070041984c5c23fa1f93b59075853f70545ce9c61b15ff65cde5078b4209217f0220f0810f739bd470d405272edb16434a11869d08d8fef065de94710ee553b410c3c02a96c156836af8d11c4af4a77e766f9ed8ec43830fe02bb22babf9b41d4e5027b49ba3f720465bf4ee9b63892030f4fea97d94bc6cd1a7d4d6869cb3185e5da3ca0da000000000000000000000017010000030000000000000000000000000000afca75c38d6500000000001701000004000000000000000000000000000eb6d7f66dc50eb3000004000000000000000000000000000000002017010000030000000000000000000000000000000000000017010000030000000000"]}], 0x4924924924924b3, 0x0) [ 225.069120][T10216] device bridge1 entered promiscuous mode 08:29:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b200000000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x38, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x68}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}], 0x4924924924924b3, 0x0) 08:29:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x200005c0, 0x0, 0x0, 0x200005f0, 0x20000620], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x220) 08:29:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b200000000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x38, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x68}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000017010000020000000000000015dc91768c78ba00b50b7a5e4e7907526d7c7c8aee968a562b00cb905e1826a8f9ee0ac480576a7134801fc070041984c5c23fa1f93b59075853f70545ce9c61b15ff65cde5078b4209217f0220f0810f739bd470d405272edb16434a11869d08d8fef065de94710ee553b410c3c02a96c156836af8d11c4af4a77e766f9ed8ec43830fe02bb22babf9b41d4e5027b49ba3f720465bf4ee9b63892030f4fea97d94bc6cd1a7d4d6869cb3185e5da3ca0da000000000000000000000017010000030000000000000000000000000000afca75c38d6500000000001701000004000000000000000000000000000eb6d7f66dc50eb3000004000000000000000000000000000000002017010000030000000000000000000000000000000000000017010000030000000000"]}], 0x4924924924924b3, 0x0) 08:29:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r3, @ANYBLOB="0000000000000027280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x401, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x101}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x60}}, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r4, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 225.158947][T10216] bridge1: port 1(bridge_slave_0) entered blocking state [ 225.178338][T10216] bridge1: port 1(bridge_slave_0) entered disabled state [ 225.189248][T10216] device bridge_slave_0 entered promiscuous mode [ 225.196495][T10216] bridge1: port 1(bridge_slave_0) entered blocking state [ 225.203691][T10216] bridge1: port 1(bridge_slave_0) entered forwarding state 08:29:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x68, &(0x7f0000000780)=0x2e4, 0x4) 08:29:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b200000000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x38, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x68}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}], 0x4924924924924b3, 0x0) [ 225.298970][T10239] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 08:29:45 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000040)=0x1, 0x2496adc755129f32) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) recvfrom$inet(r5, &(0x7f00000003c0)=""/194, 0xc2, 0x10000, 0x0, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000002ec0), 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000100), &(0x7f00000002c0)=0x8) 08:29:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r10, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc900000"], 0x3}}, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=@gcm_128={{0x304}, "4338478095a8f4c2", "55b84d6a53c2da45ac672bb6150ca37a", 'LO*4', "290a9f74bbdc625c"}, 0x28) 08:29:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b200000000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x38, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x68}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000017010000020000000000000015dc91768c78ba00b50b7a5e4e7907526d7c7c8aee968a562b00cb905e1826a8f9ee0ac480576a7134801fc070041984c5c23fa1f93b59075853f70545ce9c61b15ff65cde5078b4209217f0220f0810f739bd470d405272edb16434a11869d08d8fef065de94710ee553b410c3c02a96c156836af8d11c4af4a77e766f9ed8ec43830fe02bb22babf9b41d4e5027b49ba3f720465bf4ee9b63892030f4fea97d94bc6cd1a7d4d6869cb3185e5da3ca0da000000000000000000000017010000030000000000000000000000000000afca75c38d6500000000001701000004000000000000000000000000000eb6d7f66dc50eb3000004000000000000000000000000000000002017010000030000000000000000000000000000000000000017010000030000000000"]}], 0x4924924924924b3, 0x0) 08:29:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80}, 0x29b) bind$nfc_llcp(r2, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r1, 0xc46dfc707e1df77d}, 0x14}}, 0x0) 08:29:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x69a) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023cd3741ce8074c5fe8524c0306554362ddd4c0617b1ed0cd8cb892ef805ab93a186423f124b7c6a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e3", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a00)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5, 0xc}}, 0x20}}, 0x0) [ 225.469658][ T27] audit: type=1804 audit(1583742586.044:46): pid=10251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir333582476/syzkaller.n1yIZu/11/memory.events" dev="sda1" ino=16600 res=1 08:29:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="b200000000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x38, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x68}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}], 0x4924924924924b3, 0x0) 08:29:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r3, @ANYBLOB="0000000000000027280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x401, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x101}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x60}}, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r4, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 225.578985][ T27] audit: type=1800 audit(1583742586.074:47): pid=10251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16600 res=0 [ 225.622254][T10255] device bridge2 entered promiscuous mode [ 225.634536][ T27] audit: type=1804 audit(1583742586.084:48): pid=10251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir333582476/syzkaller.n1yIZu/11/memory.events" dev="sda1" ino=16600 res=1 08:29:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80}, 0x29b) bind$nfc_llcp(r2, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r1, 0xc46dfc707e1df77d}, 0x14}}, 0x0) 08:29:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80}, 0x29b) bind$nfc_llcp(r2, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r1, 0xc46dfc707e1df77d}, 0x14}}, 0x0) [ 225.690613][T10263] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 225.713640][T10267] device bridge_slave_0 left promiscuous mode [ 225.720382][T10267] bridge1: port 1(bridge_slave_0) entered disabled state 08:29:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80}, 0x29b) bind$nfc_llcp(r2, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r1, 0xc46dfc707e1df77d}, 0x14}}, 0x0) [ 225.831430][T10267] bridge2: port 1(bridge_slave_0) entered blocking state [ 225.854322][T10267] bridge2: port 1(bridge_slave_0) entered disabled state [ 225.867561][T10267] device bridge_slave_0 entered promiscuous mode 08:29:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80}, 0x29b) bind$nfc_llcp(r2, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r1, 0xc46dfc707e1df77d}, 0x14}}, 0x0) 08:29:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80}, 0x29b) bind$nfc_llcp(r2, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r1, 0xc46dfc707e1df77d}, 0x14}}, 0x0) [ 225.877755][T10267] bridge2: port 1(bridge_slave_0) entered blocking state [ 225.884908][T10267] bridge2: port 1(bridge_slave_0) entered forwarding state [ 225.909581][T10269] team0: Device netdevsim1 is up. Set it down before adding it as a team port [ 226.074778][T10269] team0: Port device netdevsim1 added [ 226.265915][ T27] audit: type=1804 audit(1583742586.844:49): pid=10258 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir333582476/syzkaller.n1yIZu/11/memory.events" dev="sda1" ino=16600 res=1 [ 226.294297][ T27] audit: type=1800 audit(1583742586.874:50): pid=10258 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16600 res=0 08:29:46 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000040)=0x1, 0x2496adc755129f32) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) recvfrom$inet(r5, &(0x7f00000003c0)=""/194, 0xc2, 0x10000, 0x0, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000002ec0), 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000100), &(0x7f00000002c0)=0x8) 08:29:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r10, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc900000"], 0x3}}, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=@gcm_128={{0x304}, "4338478095a8f4c2", "55b84d6a53c2da45ac672bb6150ca37a", 'LO*4', "290a9f74bbdc625c"}, 0x28) 08:29:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80}, 0x29b) bind$nfc_llcp(r2, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r1, 0xc46dfc707e1df77d}, 0x14}}, 0x0) 08:29:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x69a) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023cd3741ce8074c5fe8524c0306554362ddd4c0617b1ed0cd8cb892ef805ab93a186423f124b7c6a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e3", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a00)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5, 0xc}}, 0x20}}, 0x0) 08:29:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x69a) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023cd3741ce8074c5fe8524c0306554362ddd4c0617b1ed0cd8cb892ef805ab93a186423f124b7c6a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e3", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a00)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5, 0xc}}, 0x20}}, 0x0) 08:29:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80}, 0x29b) bind$nfc_llcp(r2, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r1, 0xc46dfc707e1df77d}, 0x14}}, 0x0) [ 226.316846][ T27] audit: type=1804 audit(1583742586.874:51): pid=10297 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir333582476/syzkaller.n1yIZu/11/memory.events" dev="sda1" ino=16600 res=1 08:29:47 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000040)=0x1, 0x2496adc755129f32) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) recvfrom$inet(r5, &(0x7f00000003c0)=""/194, 0xc2, 0x10000, 0x0, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000002ec0), 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000100), &(0x7f00000002c0)=0x8) [ 226.380778][T10303] __nla_validate_parse: 1 callbacks suppressed [ 226.380788][T10303] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 08:29:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80}, 0x29b) bind$nfc_llcp(r2, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r1, 0xc46dfc707e1df77d}, 0x14}}, 0x0) 08:29:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80}, 0x29b) bind$nfc_llcp(r2, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r1, 0xc46dfc707e1df77d}, 0x14}}, 0x0) 08:29:47 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000040)=0x1, 0x2496adc755129f32) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) recvfrom$inet(r5, &(0x7f00000003c0)=""/194, 0xc2, 0x10000, 0x0, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000002ec0), 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000100), &(0x7f00000002c0)=0x8) [ 226.564346][T10305] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 226.609676][T10301] device bridge3 entered promiscuous mode [ 226.663701][T10311] team0: Port device veth3 added [ 226.669263][T10319] device bridge_slave_0 left promiscuous mode [ 226.675787][T10319] bridge2: port 1(bridge_slave_0) entered disabled state [ 226.761531][T10319] bridge3: port 1(bridge_slave_0) entered blocking state [ 226.768837][T10319] bridge3: port 1(bridge_slave_0) entered disabled state [ 226.777781][T10319] device bridge_slave_0 entered promiscuous mode [ 226.787273][T10319] bridge3: port 1(bridge_slave_0) entered blocking state [ 226.794448][T10319] bridge3: port 1(bridge_slave_0) entered forwarding state 08:29:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:29:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x69a) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023cd3741ce8074c5fe8524c0306554362ddd4c0617b1ed0cd8cb892ef805ab93a186423f124b7c6a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e3", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a00)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5, 0xc}}, 0x20}}, 0x0) [ 227.031162][T10337] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 227.117420][T10340] team0: Port device veth3 added 08:29:47 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000040)=0x1, 0x2496adc755129f32) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) recvfrom$inet(r5, &(0x7f00000003c0)=""/194, 0xc2, 0x10000, 0x0, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000002ec0), 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000100), &(0x7f00000002c0)=0x8) 08:29:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:29:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x69a) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023cd3741ce8074c5fe8524c0306554362ddd4c0617b1ed0cd8cb892ef805ab93a186423f124b7c6a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e3", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a00)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5, 0xc}}, 0x20}}, 0x0) 08:29:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x69a) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023cd3741ce8074c5fe8524c0306554362ddd4c0617b1ed0cd8cb892ef805ab93a186423f124b7c6a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e3", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a00)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5, 0xc}}, 0x20}}, 0x0) 08:29:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 227.316592][T10344] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 08:29:47 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000040)=0x1, 0x2496adc755129f32) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) recvfrom$inet(r5, &(0x7f00000003c0)=""/194, 0xc2, 0x10000, 0x0, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000002ec0), 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000100), &(0x7f00000002c0)=0x8) [ 227.397725][T10347] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 227.414263][ T27] kauditd_printk_skb: 9 callbacks suppressed [ 227.414276][ T27] audit: type=1804 audit(1583742587.994:61): pid=10351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir333582476/syzkaller.n1yIZu/13/memory.events" dev="sda1" ino=16596 res=1 08:29:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:29:48 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000040)=0x1, 0x2496adc755129f32) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) recvfrom$inet(r5, &(0x7f00000003c0)=""/194, 0xc2, 0x10000, 0x0, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000002ec0), 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000100), &(0x7f00000002c0)=0x8) [ 227.516149][ T27] audit: type=1800 audit(1583742588.034:62): pid=10351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16596 res=0 [ 227.603398][ T27] audit: type=1804 audit(1583742588.034:63): pid=10351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir333582476/syzkaller.n1yIZu/13/memory.events" dev="sda1" ino=16596 res=1 08:29:48 executing program 0: write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b405000000000000791000000000000015000000000000009500000000000000a687364927ff6ea788d8bc3f71d2ed4d1ae7a0e6ba89265e7c1e1cf7bc9a72e0d77b7b93d58f2783"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe0c, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 227.674811][ T27] audit: type=1804 audit(1583742588.094:64): pid=10360 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir612724534/syzkaller.ucTgDF/29/memory.events" dev="sda1" ino=16515 res=1 [ 227.704274][T10350] team0: Port device veth5 added [ 227.721647][T10352] team0: Port device vlan5 added [ 227.728240][ T27] audit: type=1800 audit(1583742588.094:65): pid=10360 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16515 res=0 [ 227.753648][ T27] audit: type=1804 audit(1583742588.124:66): pid=10360 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir612724534/syzkaller.ucTgDF/29/memory.events" dev="sda1" ino=16515 res=1 [ 227.799784][ T27] audit: type=1804 audit(1583742588.224:67): pid=10367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir461428953/syzkaller.StRCes/24/memory.events" dev="sda1" ino=16611 res=1 08:29:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x69a) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023cd3741ce8074c5fe8524c0306554362ddd4c0617b1ed0cd8cb892ef805ab93a186423f124b7c6a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e3", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a00)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5, 0xc}}, 0x20}}, 0x0)