Warning: Permanently added '10.128.0.221' (ECDSA) to the list of known hosts. 2020/01/28 11:23:40 fuzzer started 2020/01/28 11:23:41 dialing manager at 10.128.0.26:34995 2020/01/28 11:23:42 syscalls: 2928 2020/01/28 11:23:42 code coverage: enabled 2020/01/28 11:23:42 comparison tracing: enabled 2020/01/28 11:23:42 extra coverage: enabled 2020/01/28 11:23:42 setuid sandbox: enabled 2020/01/28 11:23:42 namespace sandbox: enabled 2020/01/28 11:23:42 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/28 11:23:42 fault injection: enabled 2020/01/28 11:23:42 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/28 11:23:42 net packet injection: enabled 2020/01/28 11:23:42 net device setup: enabled 2020/01/28 11:23:42 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/01/28 11:23:42 devlink PCI setup: PCI device 0000:00:10.0 is not available 11:26:24 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) syz_emit_ethernet(0x5e, &(0x7f0000000000)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x28, 0x29, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x0, 0x2, "84f0da52ef24571313968050378ee824f4dffba7"}]}}}}}}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) 11:26:25 executing program 1: open(&(0x7f00000004c0)='./bus\x00', 0x40, 0x0) r0 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000500)={0x76591ff02f01386a}, 0xfffffffffffffe81) writev(r0, 0x0, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000540)={0x17, 0x7, 0x0, {{0xa, '/dev/zero\x00'}}}, 0x17) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) syzkaller login: [ 272.211024][ T9829] IPVS: ftp: loaded support on port[0] = 21 [ 272.359062][ T9831] IPVS: ftp: loaded support on port[0] = 21 [ 272.371331][ T9829] chnl_net:caif_netlink_parms(): no params data found 11:26:25 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = inotify_init1(0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = dup2(r0, r2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}}) [ 272.449099][ T9829] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.456995][ T9829] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.478548][ T9829] device bridge_slave_0 entered promiscuous mode [ 272.510705][ T9829] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.527530][ T9829] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.538714][ T9829] device bridge_slave_1 entered promiscuous mode [ 272.585251][ T9834] IPVS: ftp: loaded support on port[0] = 21 [ 272.605088][ T9829] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 272.662196][ T9829] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 272.701822][ T9831] chnl_net:caif_netlink_parms(): no params data found [ 272.724643][ T9829] team0: Port device team_slave_0 added [ 272.742802][ T9829] team0: Port device team_slave_1 added [ 272.802208][ T9831] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.817505][ T9831] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.829457][ T9831] device bridge_slave_0 entered promiscuous mode 11:26:25 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(0x0, 0x0) getrandom(&(0x7f00000004c0)=""/4096, 0x1000, 0x0) [ 272.848711][ T9831] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.857111][ T9831] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.867593][ T9831] device bridge_slave_1 entered promiscuous mode [ 272.887234][ T9829] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 272.899584][ T9829] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 272.928224][ T9829] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 273.030151][ T9829] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 273.037142][ T9829] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 273.063331][ T9829] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 273.076761][ T9831] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 273.123722][ T9838] IPVS: ftp: loaded support on port[0] = 21 [ 273.142846][ T9831] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 11:26:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket(0xa, 0x40000000002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x4000) [ 273.230772][ T9829] device hsr_slave_0 entered promiscuous mode [ 273.290606][ T9829] device hsr_slave_1 entered promiscuous mode [ 273.375228][ T9834] chnl_net:caif_netlink_parms(): no params data found [ 273.416383][ T9831] team0: Port device team_slave_0 added [ 273.434608][ T9831] team0: Port device team_slave_1 added 11:26:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000580)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) [ 273.516454][ T9840] IPVS: ftp: loaded support on port[0] = 21 [ 273.595883][ T9831] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 273.604206][ T9831] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 273.631835][ T9831] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 273.643530][ T9834] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.653966][ T9834] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.662256][ T9834] device bridge_slave_0 entered promiscuous mode [ 273.688447][ T9831] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 273.695441][ T9831] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 273.723117][ T9831] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 273.753791][ T9834] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.761224][ T9834] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.770055][ T9834] device bridge_slave_1 entered promiscuous mode [ 273.823863][ T9834] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 273.848426][ T9838] chnl_net:caif_netlink_parms(): no params data found [ 273.859591][ T9842] IPVS: ftp: loaded support on port[0] = 21 [ 273.862378][ T9834] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 273.929579][ T9831] device hsr_slave_0 entered promiscuous mode [ 273.967846][ T9831] device hsr_slave_1 entered promiscuous mode [ 274.037564][ T9831] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 274.045428][ T9831] Cannot create hsr debugfs directory [ 274.116004][ T9829] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 274.162360][ T9834] team0: Port device team_slave_0 added [ 274.194626][ T9829] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 274.240301][ T9829] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 274.301772][ T9834] team0: Port device team_slave_1 added [ 274.326746][ T9829] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 274.397749][ T9838] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.404858][ T9838] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.413242][ T9838] device bridge_slave_0 entered promiscuous mode [ 274.425249][ T9838] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.432547][ T9838] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.440561][ T9838] device bridge_slave_1 entered promiscuous mode [ 274.460311][ T9834] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 274.467641][ T9834] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 274.493967][ T9834] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 274.558433][ T9834] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 274.565427][ T9834] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 274.592015][ T9834] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 274.611369][ T9838] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 274.651640][ T9838] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 274.749465][ T9834] device hsr_slave_0 entered promiscuous mode [ 274.778202][ T9834] device hsr_slave_1 entered promiscuous mode [ 274.827821][ T9834] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 274.835726][ T9834] Cannot create hsr debugfs directory [ 274.842390][ T9840] chnl_net:caif_netlink_parms(): no params data found [ 274.854010][ T9838] team0: Port device team_slave_0 added [ 274.866685][ T9838] team0: Port device team_slave_1 added [ 274.941431][ T9838] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 274.948541][ T9838] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 274.974860][ T9838] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 275.023517][ T9838] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 275.030959][ T9838] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 275.057003][ T9838] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 275.096707][ T9831] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 275.190979][ T9838] device hsr_slave_0 entered promiscuous mode [ 275.227837][ T9838] device hsr_slave_1 entered promiscuous mode [ 275.287705][ T9838] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 275.295533][ T9838] Cannot create hsr debugfs directory [ 275.305443][ T9831] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 275.349592][ T9840] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.356716][ T9840] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.365516][ T9840] device bridge_slave_0 entered promiscuous mode [ 275.379645][ T9842] chnl_net:caif_netlink_parms(): no params data found [ 275.402678][ T9831] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 275.459959][ T9840] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.467069][ T9840] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.477024][ T9840] device bridge_slave_1 entered promiscuous mode [ 275.524414][ T9831] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 275.650491][ T9829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.661116][ T9840] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 275.675337][ T9840] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 275.746247][ T9842] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.753680][ T9842] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.762242][ T9842] device bridge_slave_0 entered promiscuous mode [ 275.770287][ T9834] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 275.842400][ T9840] team0: Port device team_slave_0 added [ 275.850745][ T9840] team0: Port device team_slave_1 added [ 275.865979][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.874612][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.890986][ T9829] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.900325][ T9842] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.908744][ T9842] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.916496][ T9842] device bridge_slave_1 entered promiscuous mode [ 275.924123][ T9834] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 275.985002][ T9834] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 276.072941][ T9834] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 276.124683][ T9842] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 276.138541][ T9842] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 276.148659][ T9840] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 276.156183][ T9840] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 276.186721][ T9840] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 276.205543][ T9840] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 276.212646][ T9840] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 276.239929][ T9840] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 276.260603][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.269259][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.278213][ T3160] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.285443][ T3160] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.293803][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.304549][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.313149][ T3160] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.320374][ T3160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.328615][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.337524][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.430695][ T9840] device hsr_slave_0 entered promiscuous mode [ 276.467868][ T9840] device hsr_slave_1 entered promiscuous mode [ 276.517526][ T9840] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 276.525294][ T9840] Cannot create hsr debugfs directory [ 276.550453][ T9842] team0: Port device team_slave_0 added [ 276.584602][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 276.593579][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 276.604585][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.613530][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 276.622178][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.631172][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 276.639983][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.649095][ T9838] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 276.691077][ T9842] team0: Port device team_slave_1 added [ 276.696913][ T9838] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 276.750133][ T9838] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 276.833209][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 276.855512][ T9838] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 276.923374][ T9842] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 276.930854][ T9842] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 276.963468][ T9842] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 276.996003][ T9829] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 277.012278][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 277.021050][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.038562][ T9831] 8021q: adding VLAN 0 to HW filter on device bond0 [ 277.046050][ T9842] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 277.053530][ T9842] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 277.081504][ T9842] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 277.142860][ T9831] 8021q: adding VLAN 0 to HW filter on device team0 [ 277.190193][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.198533][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.217523][ T9834] 8021q: adding VLAN 0 to HW filter on device bond0 [ 277.270478][ T9842] device hsr_slave_0 entered promiscuous mode [ 277.297968][ T9842] device hsr_slave_1 entered promiscuous mode [ 277.347584][ T9842] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 277.355186][ T9842] Cannot create hsr debugfs directory [ 277.372545][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 277.380127][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.445596][ T9829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 277.456431][ T9840] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 277.500606][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.510183][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.518920][ T2714] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.526031][ T2714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.533838][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.543151][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.551813][ T2714] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.558925][ T2714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.589951][ T9840] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 277.642594][ T9840] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 277.703620][ T9840] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 277.759761][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 277.770394][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 277.779429][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.787144][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.817728][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 277.826983][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 277.838170][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 277.850128][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 277.873831][ T9834] 8021q: adding VLAN 0 to HW filter on device team0 [ 277.908539][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 277.917193][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 277.926755][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 277.935593][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 277.944550][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 277.953683][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.982274][ T9831] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 277.999837][ T9831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 278.026249][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.035013][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.043988][ T2722] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.051099][ T2722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.059423][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 278.068085][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.076431][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 278.085136][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 278.093627][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.102817][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.111297][ T2722] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.118414][ T2722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.132604][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.141508][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 278.149435][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 278.164343][ T9829] device veth0_vlan entered promiscuous mode [ 278.185027][ T9838] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.211692][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 278.236176][ T9829] device veth1_vlan entered promiscuous mode [ 278.270687][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 278.281282][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 278.291523][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 278.301107][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.309999][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 278.319225][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.339370][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 278.348466][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 278.385277][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 278.393535][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.401787][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 278.410163][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 278.421425][ T9838] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.443824][ T9831] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 278.460937][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 278.469611][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 278.487930][ T9829] device veth0_macvtap entered promiscuous mode [ 278.497204][ T9842] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 278.563286][ T9834] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 278.575020][ T9834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 278.583458][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 278.592992][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 278.601871][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.611297][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.619984][ T2714] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.627200][ T2714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.635782][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 278.644482][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.653668][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 278.661904][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.675607][ T9829] device veth1_macvtap entered promiscuous mode [ 278.683954][ T9842] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 278.770952][ T9842] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 278.815568][ T9842] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 278.872905][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 278.880987][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.889782][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.899276][ T2717] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.906338][ T2717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.914212][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 278.922914][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 278.932608][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 278.941690][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 278.963597][ T9840] 8021q: adding VLAN 0 to HW filter on device bond0 [ 279.007442][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 279.016302][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 279.028357][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 279.035943][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 279.044299][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 279.053044][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 279.061814][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 279.070426][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.079112][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 279.087495][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.096571][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 279.117215][ T9840] 8021q: adding VLAN 0 to HW filter on device team0 [ 279.143544][ T9838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 279.154586][ T9834] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 279.170400][ T9829] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 279.179214][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 279.187100][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 279.195204][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 279.204238][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 279.241994][ T9829] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 279.269872][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 279.283688][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 279.292771][ T2921] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.299973][ T2921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.308260][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 279.317041][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 279.326026][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 279.334979][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.344681][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 279.353234][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 279.365702][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 279.387835][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 279.395368][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 279.417980][ T9831] device veth0_vlan entered promiscuous mode [ 279.438614][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.447348][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.478954][ T2716] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.486003][ T2716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.504548][ T9838] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 279.524338][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 279.535405][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 279.553434][ T9831] device veth1_vlan entered promiscuous mode [ 279.574379][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 279.598535][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 279.614994][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 279.657864][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 279.666227][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.687386][ C1] hrtimer: interrupt took 45314 ns [ 279.760894][ T9834] device veth0_vlan entered promiscuous mode [ 279.782517][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 279.791540][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 279.808631][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 279.816671][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 279.826529][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 279.835368][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 279.844584][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 279.853698][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 279.863058][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 279.891574][ T9842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 279.926755][ T9840] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 279.946044][ T9840] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 279.965869][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 279.974996][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 279.984448][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.996284][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 280.011607][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 11:26:33 executing program 0: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000002780)='net/ipv6_route\x00') r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) sendfile(r1, r0, 0x0, 0xbe19) socket$unix(0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) [ 280.026775][ T9831] device veth0_macvtap entered promiscuous mode [ 280.038291][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 280.046953][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 280.062684][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 280.084871][ T9834] device veth1_vlan entered promiscuous mode [ 280.130046][ T9831] device veth1_macvtap entered promiscuous mode [ 280.139395][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 280.156230][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 280.165335][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.179912][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.194620][ T9842] 8021q: adding VLAN 0 to HW filter on device team0 [ 280.227301][ T9838] device veth0_vlan entered promiscuous mode [ 280.239052][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 280.252911][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 280.261907][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.274337][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.283399][ T2914] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.290537][ T2914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.299112][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 280.307001][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 280.323378][ T9840] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 280.357074][ T9838] device veth1_vlan entered promiscuous mode [ 280.387962][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 280.396044][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.410958][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 280.421424][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 280.430665][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 280.440610][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.449952][ T3160] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.457269][ T3160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.476031][ T9831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 280.489728][ T9831] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 280.502154][ T9831] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 280.540746][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 280.549411][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 280.565355][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 280.574406][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 11:26:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in=@empty, 0x0, 0x6c}, 0x2, @in6=@dev, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) sendmmsg(r2, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 280.584524][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 280.594308][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 280.612855][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 280.650045][ T9831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 280.662763][ T9831] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 280.675131][ T9831] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 280.689750][ T9834] device veth0_macvtap entered promiscuous mode [ 280.733693][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 280.750711][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 280.762501][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 280.771753][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 280.781969][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 280.791393][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 280.800559][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 280.810335][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 280.819847][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 280.851115][ T9834] device veth1_macvtap entered promiscuous mode [ 280.866515][ T9838] device veth0_macvtap entered promiscuous mode [ 280.887129][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 280.896412][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 280.905504][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 280.917022][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 280.926437][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 280.935489][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 280.945146][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 280.962959][ T9842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 280.991656][ T9838] device veth1_macvtap entered promiscuous mode [ 281.018423][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 281.043410][ T9834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 281.061904][ T9834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 11:26:34 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={0x0}, 0x12012, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = eventfd(0x0) gettid() kcmp(r2, r2, 0x0, r3, r3) [ 281.102931][ T28] audit: type=1804 audit(1580210794.142:31): pid=9868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir974891031/syzkaller.IxcnqA/0/bus" dev="sda1" ino=16524 res=1 [ 281.105347][ T9834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 11:26:34 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x8) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8}, @CTA_EXPECT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}]}]}, 0x28}}, 0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="07010000060000000000000000000000000000000000100008000000000000000529"], 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 281.165596][ T9834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 281.169789][ T28] audit: type=1804 audit(1580210794.172:32): pid=9868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir974891031/syzkaller.IxcnqA/0/bus" dev="sda1" ino=16524 res=1 [ 281.219694][ T9834] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 281.276740][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 281.300783][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.324363][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 281.333980][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.344217][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 281.353120][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 281.366763][ T9838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 281.378343][ T9838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 281.388753][ T9838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 281.399698][ T9838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 281.412499][ T9838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 281.423527][ T9838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 281.435255][ T9838] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 281.450630][ T9842] 8021q: adding VLAN 0 to HW filter on device batadv0 11:26:34 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = eventfd(0x0) r2 = gettid() kcmp(r2, r0, 0x0, r1, 0xffffffffffffffff) [ 281.499323][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 281.514500][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.553271][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 281.564671][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.573635][ T9834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 281.585915][ T9834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 281.596848][ T9834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 281.607450][ T9834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 281.619232][ T9834] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 281.629511][ T9838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 281.640860][ T9838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 281.651847][ T9838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 281.663650][ T9838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 281.678687][ T9838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 281.691827][ T9838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 281.704538][ T9838] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 281.712780][ T9840] device veth0_vlan entered promiscuous mode [ 281.722390][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.740101][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.748984][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.759105][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.769865][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.779123][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.837015][ T9840] device veth1_vlan entered promiscuous mode 11:26:34 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() kcmp(r1, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 282.073332][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 282.082892][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 282.091778][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 282.110198][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 11:26:35 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xeb07) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f0000000640)=""/223) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000}}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000005c0)={{0x2, 0x4e24, @loopback}, {0x0, @local}, 0x40, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'team0\x00'}) sendmsg$nl_xfrm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38010000100013070000000000000000fe8000000000000000000000000000000000000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009d300000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480001006d643500"/240], 0x138}}, 0x0) r6 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_int(r6, 0x0, 0xb, &(0x7f00006ed000), &(0x7f0000000000)=0xfffffffffffffcfd) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f00000000c0)={'team0\x00'}) symlinkat(&(0x7f0000000200)='./file0\x00', r3, 0x0) [ 282.120376][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 282.132704][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 282.146389][ T9840] device veth0_macvtap entered promiscuous mode [ 282.171288][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 282.181508][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 282.190938][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 11:26:35 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) [ 282.215148][ T9840] device veth1_macvtap entered promiscuous mode [ 282.239966][ T9842] device veth0_vlan entered promiscuous mode [ 282.255227][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 282.267962][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 282.275932][ T9905] devpts: called with bogus options [ 282.312571][ T9842] device veth1_vlan entered promiscuous mode [ 282.355919][ T9840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 282.401832][ T9840] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.438410][ T9840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 282.466561][ T9840] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.486576][ T9840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 282.498480][ T9840] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.508837][ T9840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 282.520045][ T9840] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.534406][ T9840] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 282.560668][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 282.569578][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 282.578317][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 282.587107][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 282.599007][ T9840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 282.611166][ T9840] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.621421][ T9840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 282.631880][ T9840] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.641750][ T9840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 282.652208][ T9840] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.662239][ T9840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 282.672885][ T9840] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.684617][ T9840] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 282.698129][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 282.707031][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 282.729155][ T9842] device veth0_macvtap entered promiscuous mode [ 282.738322][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 282.747309][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 282.760367][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 282.779100][ T9842] device veth1_macvtap entered promiscuous mode 11:26:35 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = getpid() r1 = eventfd(0x0) kcmp(r0, r0, 0x0, r1, r1) 11:26:35 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x11) faccessat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x3, 0x0) [ 282.835727][ T9842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 282.852501][ T9842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.889008][ T9842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 282.915269][ T9842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.931002][ T9842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 282.952606][ T9842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.962807][ T9842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 282.977508][ T9842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.992555][ T9842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 283.008546][ T9842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 283.021231][ T9842] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 283.037641][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 283.045761][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 283.055908][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 283.069066][ T9842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 283.083116][ T9842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 283.102661][ T9842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 283.113849][ T9842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 283.124049][ T9842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 283.134966][ T9842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 283.145136][ T9842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 283.155765][ T9842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 283.166335][ T9842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 283.177753][ T9842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 283.189684][ T9842] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 283.206846][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 283.216919][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 283.400453][ T9933] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 11:26:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000bc0)={0xffffffffffffffff}) setsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 11:26:36 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) dup3(r1, r0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x9, 0x0, 0x0) 11:26:36 executing program 0: clone(0x41fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180)=[{0xd, 0x1000000000000, 0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x10, r0) ptrace$getregs(0xc, r0, 0x0, &(0x7f0000003180)=""/4098) 11:26:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000500200009400000028010000940000000000000000000000bc010000bc010000bc010000bc010000bc01000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009400000000000000000000000000000000000000000024000000000000000000000000000000000000000000000000000000000000009400009400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700094000000000000000000000000000000000000000000240052454a4543540000000000000000000000000000000000000000000000000000000000000000ac1414aa000000000000000000000000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700094000000000000000000000000000000000000000000240052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffff"], 0xffffffffffffff7f) 11:26:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000900)=@filter={'filter\x00', 0xe, 0x4, 0x3e8, 0x108, 0x248, 0x108, 0x108, 0x248, 0x318, 0x318, 0x318, 0x318, 0x318, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast1, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, {{@ipv6={@dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'rose0\x00', 'netdevsim0\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'veth1_to_hsr\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x1}}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "7d3638aa6fdf5a2643a658a1970cb298eafde929826ad0bdbdc54a434d3e"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x448) 11:26:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, 0x0, 0x0) 11:26:36 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) dup3(r1, r0, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) [ 283.738292][ T9952] x_tables: duplicate underflow at hook 2 11:26:36 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) dup3(r1, r0, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) 11:26:36 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@random="211b8202eb14", @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @local}, @dest_unreach={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @empty}}}}}}, 0x0) [ 283.785684][ T9962] x_tables: duplicate underflow at hook 2 11:26:36 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) dup2(r1, r3) bind$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xd) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) accept$unix(r5, 0x0, &(0x7f00000000c0)) 11:26:36 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x5452, &(0x7f0000000040)) 11:26:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) setsockopt$inet_mreq(r2, 0x0, 0x0, 0x0, 0x0) 11:26:37 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) dup2(r0, r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000600)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) getsockname$inet6(r4, 0x0, &(0x7f0000000440)) 11:26:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, 0x0, 0x0) 11:26:37 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000000), 0x4) 11:26:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, 0x0) 11:26:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/zero\x00', 0x1, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 11:26:37 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 11:26:37 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) dup3(r1, r0, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 11:26:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000bc0)={0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet6_mreq(r1, 0x29, 0x0, 0x0, 0xa6) 11:26:37 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREADLINK(r0, 0x0, 0x0) 11:26:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000380)=0x404100000001, 0xfe3f) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132441) connect$unix(r1, &(0x7f00000000c0)=@abs, 0x6e) dup(0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) write$evdev(0xffffffffffffffff, 0x0, 0x0) 11:26:37 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = fcntl$dupfd(r0, 0x0, r0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) 11:26:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 11:26:38 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) dup3(r1, r0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x46) 11:26:38 executing program 1: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x77359400}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = dup(r0) write$P9_RWRITE(r2, 0x0, 0x0) 11:26:38 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) dup3(r1, r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="04", 0x1, 0x0, 0x0, 0x0) 11:26:38 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='cgroup.controllers\x00', 0x2761, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 11:26:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x7, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x6}]}, 0x1c}}, 0x0) 11:26:38 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:26:38 executing program 1: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000600)='NLBL_CIPSOv4\x00') socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 285.408309][T10056] netlink: 'syz-executor.3': attribute type 6 has an invalid length. 11:26:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @my}, 0x47, 0x0, 0x0, &(0x7f0000000340)=""/19, 0xfffffffffffffc50}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000100), 0x8) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x183000) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@local, @in6=@mcast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r2, 0x3b72, &(0x7f0000001280)={0x18}) ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045510, 0x0) 11:26:38 executing program 3: r0 = socket$inet(0x2, 0x3, 0x19) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x1a, 0x0, &(0x7f0000000000)) 11:26:39 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000200)={0x80033d, 0x20000000209}) 11:26:42 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0xd, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 11:26:42 executing program 0: io_uring_setup(0x800000000000e44, &(0x7f0000000040)) 11:26:42 executing program 1: r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000802010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) close(0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 11:26:42 executing program 2: syz_mount_image$btrfs(&(0x7f00000002c0)='btrfs\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='t']) 11:26:42 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000200)={0x80033d, 0x20000000209}) 11:26:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000100), 0x8) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x183000) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@local, @in6=@mcast2}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) ioctl$VFIO_IOMMU_UNMAP_DMA(0xffffffffffffffff, 0x3b72, &(0x7f0000001280)={0x18}) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, 0x0) 11:26:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 11:26:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nvram\x00', 0x0, 0x0) [ 289.428547][T10087] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 289.447835][T10087] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.1'. [ 289.531472][T10087] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 289.544456][T10087] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.1'. 11:26:42 executing program 1: ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@local, @broadcast}, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x8, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x157) sendfile(r1, r1, &(0x7f0000000040), 0x8080fffffffe) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 11:26:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x100001, 0x4) 11:26:42 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r2}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x1}, 0x18, &(0x7f0000000b80)={&(0x7f0000000000)='*', 0x1}}, 0x0) 11:26:42 executing program 2: ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000340)) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000003c0)=0x5) sched_yield() r2 = creat(0x0, 0x0) openat$cgroup(r2, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x8, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x157) sendfile(r1, r1, &(0x7f0000000040), 0x8080fffffffe) 11:26:42 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x230, &(0x7f0000000440)="df62ffc93c70d87064e8d91d3d6ee2e04b91ab10143d9bbe8edd92b3652f25ac64ace69141f6164b425da259db14d57828ebf97836a8f232674be5100420893cba211c4afdb04bf6c06f65185bc10abcc7c0969537e541a4d922f0cddacfdd4af9e7d70db76e242ce122dda76dbe672d43581adc03ff062fb54a13a33238f7c44645b55bc40a71d047574ee55ff0844253adccdaaf2e62755b7942d09ebe2beb6233101095b70837bf55747d20185d9f975487cc22428c3903dc967c33debfe06164d56272e65b625ba1db25e4d3f3e9b3e4c41f6c757e", 0x0, 0xfadc, 0x0, 0x0, 0xe4b64aed, &(0x7f00000000c0)="2dd5a7d58ff97d77be3e3209640a4b7feaa9067b232757ce50ad31cd9fa8b9b2adcf1c3e5b01e5a6003db1a5ba14d5d1076860d9ef9bed3adcb997bdc7f7144a4f3bde3e01123b8bec66468e350fee8121e78899960d28313f8bf2fe509228c419f05ce35f6d71d9cc7c026b7fffc08d1461ac8b1736dc7d7cea1182e6d9e802f791b739aa126fb65ab21e5f8b116fbd81b9709d00a944e7341c0306a3"}, 0x28) 11:26:42 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x0, 0x0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 11:26:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r1, 0xc46dfc707e1df77d}, 0x14}}, 0x0) [ 289.937473][T10138] vcan0: tx drop: invalid da for name 0x0000000000000001 [ 289.938102][T10137] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 289.961862][T10137] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 290.079628][T10138] vcan0: tx drop: invalid da for name 0x0000000000000001 11:26:43 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x0, 0x0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 11:26:43 executing program 1: socket$inet6(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @empty}]}]}]}, 0x3c}}, 0x0) 11:26:43 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x230, &(0x7f0000000440)="df62ffc93c70d87064e8d91d3d6ee2e04b91ab10143d9bbe8edd92b3652f25ac64ace69141f6164b425da259db14d57828ebf97836a8f232674be5100420893cba211c4afdb04bf6c06f65185bc10abcc7c0969537e541a4d922f0cddacfdd4af9e7d70db76e242ce122dda76dbe672d43581adc03ff062fb54a13a33238f7c44645b55bc40a71d047574ee55ff0844253adccdaaf2e62755b7942d09ebe2beb6233101095b70837bf55747d20185d9f975487cc22428c3903dc967c33debfe06164d56272e65b625ba1db25e4d3f3e9b3e4c41f6c757e", 0x0, 0xfadc, 0x0, 0x0, 0xe4b64aed, &(0x7f00000000c0)="2dd5a7d58ff97d77be3e3209640a4b7feaa9067b232757ce50ad31cd9fa8b9b2adcf1c3e5b01e5a6003db1a5ba14d5d1076860d9ef9bed3adcb997bdc7f7144a4f3bde3e01123b8bec66468e350fee8121e78899960d28313f8bf2fe509228c419f05ce35f6d71d9cc7c026b7fffc08d1461ac8b1736dc7d7cea1182e6d9e802f791b739aa126fb65ab21e5f8b116fbd81b9709d00a944e7341c0306a3"}, 0x28) 11:26:43 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 11:26:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) [ 290.216588][T10154] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING 11:26:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000019c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={&(0x7f0000000380)={0x14, r2, 0x1f01}, 0x14}, 0x1, 0xa00}, 0x0) [ 290.365912][T10146] FAT-fs (loop2): error, invalid access to FAT (entry 0x000005b5) [ 290.377697][T10146] FAT-fs (loop2): Filesystem has been set read-only 11:26:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x34}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r5 = socket(0x10, 0x803, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000700)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x5865}}, 0x20}}, 0x0) [ 290.428400][T10146] FAT-fs (loop2): error, invalid access to FAT (entry 0x000005b5) 11:26:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f000004bfe4)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) getsockopt$sock_buf(r1, 0x1, 0x19, 0x0, &(0x7f0000000000)=0x278) [ 290.506955][T10173] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 290.508019][T10146] FAT-fs (loop2): error, invalid access to FAT (entry 0x000005b5) [ 290.597823][T10146] FAT-fs (loop2): error, invalid access to FAT (entry 0x000005b5) 11:26:43 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000200)={0x80033d, 0x20000000209}) 11:26:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x100000003, 0x33) sendto$inet6(r1, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 11:26:43 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="71832c8f", 0x4) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0xfffffd0d) 11:26:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000b80), 0x80800) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') recvmmsg(r2, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/224, 0xe0}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f000001d000)={0x14, r3, 0x709}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) 11:26:43 executing program 0: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @dev}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000280)="98c3b8b156e40dfc1a25d837e1fb0344cb4bb78d623af8b45adca677f14a2279b92ada05325c5bf1579d629bf28a02dd1316eec9ec24fdaac8142878281d07e011e6d7aa0c0986bb4b34b18d2962508c2a80fad4d644e59109bccd746800156c4fc6df301fc7f1b38db417054cfae6e2ae6fc040493ba55575cf690cefdd8e45c3fbe28fc1125d44c0572b108dcfc25d47163b76a59653cd453b173ddf4cf612fa783f6777c6201153671b15cff62902d9c078c3ffeccf4646886657cf0241c54c7df58dd0083380a7a0", 0xfffffffffffffdc2, 0x1f4, 0x0, 0xffffffffffffffaa) 11:26:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x0, @ipv4}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0xbb8) 11:26:44 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000003a40)="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"/294, 0xffffffffffffff5d, 0x20000000, 0x0, 0xffffff8e) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) accept4(r0, 0x0, &(0x7f0000002340), 0x800) r4 = socket$inet6(0xa, 0x8000000000005, 0x0) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) accept$inet(r3, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r5, 0x0, 0x0) socket(0xa, 0x0, 0x0) 11:26:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x800000007, 0x7fff, 0x8000000001, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2}, 0x3c) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 11:26:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8e01000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x220, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e164426fbe80279fd1f3757240feb1924a8b7bf0724918eff7efb257f700"}}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_bond\x00', 'bond0\x00', {}, {}, 0x188}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x280) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:26:44 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) [ 291.279018][T10215] No such timeout policy "syz0" 11:26:44 executing program 0: r0 = socket(0x10, 0x2, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)={0x20, 0x1, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) [ 291.343575][T10215] No such timeout policy "syz0" 11:26:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) 11:26:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8e01000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x220, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e164426fbe80279fd1f3757240feb1924a8b7bf0724918eff7efb257f700"}}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_bond\x00', 'bond0\x00', {}, {}, 0x188}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x280) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 291.486404][T10229] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 291.532814][T10229] netem: invalid attributes len -19 [ 291.549824][T10229] netem: change failed 11:26:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) 11:26:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8e01000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x220, 0x4c00, 0x0, 0x0, 0x0, 0xb0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e164426fbe80279fd1f3757240feb1924a8b7bf0724918eff7efb257f700"}}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_bond\x00', 'bond0\x00', {}, {}, 0x188}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x280) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 291.652690][T10240] No such timeout policy "syz0" [ 291.753639][T10249] No such timeout policy "syz0" 11:26:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) [ 291.792041][T10249] No such timeout policy "syz0" 11:26:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff000d000000020000000b000000ec0079c9130001", 0x1f}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xff, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102", 0x1cb}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 11:26:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x18, 0x30, 0x119, 0x0, 0x0, {0x3}, [@generic='\x00']}, 0x18}}, 0x0) 11:26:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:45 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000180)={@multicast2, @local}, 0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'syz_tun\x00', 0x2000000000000001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'syz_tun\x00'}) 11:26:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) [ 292.205906][T10265] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 11:26:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x0, @ipv4={[], [], @rand_addr=0x7fffffff}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 11:26:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}]}, 0x3c}}, 0x0) 11:26:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}]}, 0x3c}}, 0x0) [ 292.621318][T10282] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 292.646678][T10282] netem: invalid attributes len -19 [ 292.671685][T10282] netem: change failed 11:26:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}]}, 0x3c}}, 0x0) 11:26:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x24088080, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), 0x4) 11:26:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, 0x0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}]}, 0x3c}}, 0x0) [ 292.932038][T10298] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:26:46 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x18, 0x30, 0x119, 0x0, 0x0, {0x4}, [@generic='\x00']}, 0x18}}, 0x0) 11:26:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, 0x0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}]}, 0x3c}}, 0x0) [ 293.406254][T10323] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 293.486362][T10323] netem: invalid attributes len -19 [ 293.504750][T10323] netem: change failed 11:26:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x80002, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)={0x1c, r3, 0x1, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 11:26:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:46 executing program 3: socket$alg(0x26, 0x5, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000900), 0x0, 0x0, 0x0, 0x0) r1 = socket(0x2, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) 11:26:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, 0x0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}]}, 0x3c}}, 0x0) 11:26:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) [ 293.619270][T10333] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! 11:26:46 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r1 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}]}, 0x3c}}, 0x0) 11:26:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x800000007, 0x7fff, 0x8000000001}, 0x2c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x400000077fffb, 0x0, 0x820000, 0x0}, 0x2c) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0, 0x8011, r0, 0x0) 11:26:47 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:47 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000040601010000000000000002000000000500010007"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffdd, 0x0) 11:26:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:47 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r1 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}]}, 0x3c}}, 0x0) 11:26:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x8, 0x5e, 0x0, 0x0, @u32}]}]}, 0x24}}, 0x0) 11:26:47 executing program 3: pipe(0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240)={0x3}, 0x4) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c796b0f81a11ab4971f9166617ce6ddcd387151c14b93d20ca8f83d9cced9e34e7d843976e19ffffffffffffff21de80451b383f21435cb49840b0f61274420a5d97b4485529"], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000014009ff300000000000000000a000000", @ANYRES32, @ANYBLOB="14000100fe80000000007291050c00000000000014000200e7693653d520c048f85afc34d511c9ac"], 0x40}}, 0x0) 11:26:47 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r1 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}]}, 0x3c}}, 0x0) 11:26:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) [ 294.285742][T10374] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 294.326874][T10374] netem: invalid attributes len -19 [ 294.361419][T10374] netem: change failed 11:26:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(0x0) r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) 11:26:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:48 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(0x0) r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) 11:26:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) write$P9_RLCREATE(r1, &(0x7f0000000000)={0x18, 0xf, 0x0, {{0x0, 0x1}}}, 0x6001a3f38a54e6ab) 11:26:48 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000340)={@broadcast, @broadcast, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @empty, @remote, @remote={0xac, 0x14, 0x0}}}}}, 0x0) 11:26:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000580)=""/81, 0x51}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e0075e) shutdown(r1, 0x0) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect(r3, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) semget(0x3, 0x4, 0x450) getuid() r4 = msgget$private(0x0, 0x0) msgrcv(r4, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r5, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1}, 0x0) dup(r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xccf3, 0x0, 0x0, 0x800e00551) shutdown(r6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r7 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0x4, &(0x7f0000000000), 0x4) sendto(r7, &(0x7f0000000100)="a2c81bf89d543af8", 0x8, 0x0, &(0x7f0000000200)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 11:26:48 executing program 3: mknod(&(0x7f0000000040)='./file0\x00', 0x3a0914c44f7b812c, 0x902) open(&(0x7f0000000080)='./file0\x00', 0x1, 0x0) 11:26:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(0x0) r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) [ 295.190115][T10421] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 295.260470][T10421] netem: invalid attributes len -19 [ 295.297552][T10421] netem: change failed 11:26:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:48 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r1, 0x8990, &(0x7f00000006c0)={'bond0\x00', @ifru_names='vlan1\x00'}) 11:26:48 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r1 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}]}, 0x3c}}, 0x0) 11:26:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:48 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) [ 295.993251][T10459] bond0: (slave vlan1): slave is up - this may be due to an out of date ifenslave 11:26:49 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r1 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}]}, 0x3c}}, 0x0) [ 296.122291][T10470] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 296.144145][T10470] netem: invalid attributes len -19 [ 296.167050][T10470] netem: change failed 11:26:49 executing program 1: 11:26:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xd0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000024000705000000080000000000000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0002000008000100706965000c0002000800040000000000"], 0x38}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xd, &(0x7f0000000100)}], 0x492492492492642, 0x0) 11:26:49 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:49 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r1 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}]}, 0x3c}}, 0x0) 11:26:49 executing program 1: 11:26:49 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x0) 11:26:49 executing program 3: 11:26:49 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:49 executing program 1: 11:26:50 executing program 3: 11:26:50 executing program 1: 11:26:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x0) 11:26:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) [ 297.034193][T10514] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 297.096330][T10514] netem: invalid attributes len -19 11:26:50 executing program 1: 11:26:50 executing program 3: [ 297.150831][T10514] netem: change failed 11:26:50 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:50 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x0) 11:26:50 executing program 1: 11:26:50 executing program 3: 11:26:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:50 executing program 3: 11:26:50 executing program 1: 11:26:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 11:26:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) [ 297.974019][T10552] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 11:26:51 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2c}}}, 0xb8}}, 0x0) [ 298.034565][T10552] netem: invalid attributes len -19 [ 298.046882][T10552] netem: change failed 11:26:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x28120, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0), 0x41395529) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(0x0, 0x0, 0x408440) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r2, &(0x7f0000000040), 0x8) [ 298.209924][T10564] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 298.231771][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 11:26:51 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:51 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 11:26:51 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x48, 0x0, 0x0) 11:26:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(0xffffffffffffffff, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(0xffffffffffffffff, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 11:26:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup2(r0, r0) shutdown(r1, 0x0) [ 298.828715][T10584] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 11:26:51 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) [ 298.921321][T10584] netem: invalid attributes len -19 [ 298.951707][T10584] netem: change failed 11:26:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 11:26:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(0xffffffffffffffff, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000007b40)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)='f', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)='\r', 0x1}], 0x1, &(0x7f0000000980)=[{0x10}], 0x10}}], 0x2, 0x0) 11:26:52 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:52 executing program 1: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0xffffffffffffffff, 0x6c}, &(0x7f0000001fee)='R\x05rist\xe3cusgrVid:De', 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) 11:26:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 11:26:52 executing program 0: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:52 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r0, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:52 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000f3c000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) mmap(&(0x7f0000ff4000/0xb000)=nil, 0xb000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000080)="5531f5e79d1230ddde98e2f96ff18ba1390fc35e67d75c5a6808890339fb4c7d", 0x220}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e101b8da27a3185d39bb2f03d0a65a822100b301f45542d83e05d01a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x3c0}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x0) mmap(&(0x7f0000196000/0x4000)=nil, 0x4000, 0x0, 0x8032, r1, 0x0) [ 299.652587][T10625] ptrace attach of "/root/syz-executor.1"[10629] was attempted by "/root/syz-executor.1"[10625] 11:26:52 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') 11:26:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 11:26:52 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r0, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) [ 299.774295][T10645] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 11:26:52 executing program 0: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) [ 299.837578][T10645] netem: invalid attributes len -19 [ 299.879838][T10645] netem: change failed 11:26:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r1 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, 0x0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}]}, 0x3c}}, 0x0) 11:26:53 executing program 1: 11:26:53 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r0, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:53 executing program 3: 11:26:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r1 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, 0x0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}]}, 0x3c}}, 0x0) 11:26:53 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$inet(0x10, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r1, 0x0, 0x4ffdf, 0x0) 11:26:53 executing program 1: syz_emit_ethernet(0x140, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60fe80000014060000000000000001000000ebff01000000fe8000000000000000000000000000aa00000000878036b7216d2f872b10d7db146f81435af3e25c0ac4dc7f818245", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="781000"], 0x0) 11:26:53 executing program 0: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r1 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, 0x0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}]}, 0x3c}}, 0x0) 11:26:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="10000000ffff00000100000000000000f841cb8e518610c01b122b5a622a49aa8dfa2a58b9668be1361f9a3a49dce5aa7be22499f07f1911427c"], 0x10}, 0x0) r1 = socket(0x2, 0x400000001002, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="9622224a57c705dc998af246020000dfff000000ffffffffe30069"], 0x246}, 0x0) getsockopt(r2, 0x7fff, 0x5e8, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file0\x00') getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000040), &(0x7f0000000080)=0xc) write(r0, 0x0, 0x0) r3 = semget$private(0x0, 0x7, 0x286) r4 = socket(0x2, 0x2, 0x0) connect$unix(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="82022e6f666956653000"], 0x10) lseek(r4, 0x0, 0x0) semop(r3, &(0x7f0000000000)=[{0x6, 0x4}, {0x0, 0x1, 0x1800}, {0x2, 0xf, 0x800}, {0x0, 0xdc, 0x1800}], 0x4) semctl$SETVAL(r3, 0x0, 0x8, &(0x7f00000000c0)) 11:26:53 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r0, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x1, 0x4}, 0x3c) 11:26:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) 11:26:53 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000280)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 11:26:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 11:26:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) 11:26:54 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$inet(0x10, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r1, 0x0, 0x4ffdf, 0x0) 11:26:54 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r0, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) 11:26:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac6188d1c739d953059bcecc7a95425a3a07e758054ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xffffffffffffffeb, 0x200003e8, 0x0, 0x27) 11:26:54 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000000), 0x4) mmap(&(0x7f0000196000/0x4000)=nil, 0xc07000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 11:26:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x34}}, 0x0) 11:26:54 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r0, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x2, 0x5, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x50}}, 0x0) 11:26:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x34}}, 0x0) 11:26:54 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r0, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:55 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$inet(0x10, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r1, 0x0, 0x4ffdf, 0x0) 11:26:55 executing program 3: r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:26:55 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) readv(r0, &(0x7f0000000580)=[{&(0x7f0000000340)=""/185, 0xb9}], 0x1) 11:26:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x34}}, 0x0) 11:26:55 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r0, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) syz_genetlink_get_family_id$netlbl_calipso(0x0) 11:26:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}]}, 0x3c}}, 0x0) 11:26:55 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0xb9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(r1, 0x0, 0x2, 0x0, 0x0, 0x0) 11:26:55 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r0, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/uts\x00') 11:26:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) [ 302.802510][ T28] audit: type=1804 audit(1580210815.842:33): pid=10793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/38/cgroup.controllers" dev="sda1" ino=16654 res=1 [ 302.849645][T10793] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 11:26:56 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}]}, 0x3c}}, 0x0) 11:26:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:56 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x2, 0x0, 0x0) 11:26:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) syz_genetlink_get_family_id$netlbl_calipso(0x0) 11:26:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000180)={@multicast2, @local}, 0xc) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'syz_tun\x00'}) 11:26:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}]}, 0x3c}}, 0x0) 11:26:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x34}}, 0x0) [ 303.675004][ T28] audit: type=1804 audit(1580210816.712:34): pid=10827 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/39/cgroup.controllers" dev="sda1" ino=16674 res=1 11:26:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) [ 304.014790][T10827] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 11:26:57 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x34}}, 0x0) 11:26:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:26:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) syz_genetlink_get_family_id$netlbl_calipso(0x0) 11:26:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:26:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x34}}, 0x0) 11:26:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:26:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x34}}, 0x0) [ 304.682076][ T28] audit: type=1804 audit(1580210817.722:35): pid=10876 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/40/cgroup.controllers" dev="sda1" ino=16619 res=1 [ 304.697754][T10876] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 11:26:58 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:26:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x34}}, 0x0) 11:26:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) syz_genetlink_get_family_id$netlbl_calipso(0x0) 11:26:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0b") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:26:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x34}}, 0x0) 11:26:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:26:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0b") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) [ 305.575919][ T28] audit: type=1804 audit(1580210818.612:36): pid=10915 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/41/cgroup.controllers" dev="sda1" ino=16674 res=1 [ 305.605735][T10915] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 11:26:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:26:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) 11:26:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0b") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:59 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:26:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 11:26:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) 11:26:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0b") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) [ 306.318434][ T28] audit: type=1804 audit(1580210819.362:37): pid=10962 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/42/cgroup.controllers" dev="sda1" ino=16691 res=1 [ 306.331073][T10962] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 11:26:59 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) [ 306.385897][T10970] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 11:26:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) 11:26:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:26:59 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:26:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x34}}, 0x0) 11:26:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0b") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:26:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 11:26:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) [ 306.985560][ T28] audit: type=1804 audit(1580210820.022:38): pid=11001 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/43/cgroup.controllers" dev="sda1" ino=16691 res=1 11:27:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x34}}, 0x0) 11:27:00 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0b") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:00 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:27:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:27:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x34}}, 0x0) 11:27:00 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) [ 307.328210][T11023] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 11:27:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 11:27:00 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x34}}, 0x0) 11:27:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe84780") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:27:00 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x34}}, 0x0) [ 307.777293][ T28] audit: type=1804 audit(1580210820.812:39): pid=11044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/44/cgroup.controllers" dev="sda1" ino=16690 res=1 11:27:01 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:27:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 11:27:01 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x34, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x34}}, 0x0) 11:27:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe84780") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:27:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe84780") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:01 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) [ 308.232124][ T28] audit: type=1804 audit(1580210821.272:40): pid=11073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/45/cgroup.controllers" dev="sda1" ino=16706 res=1 11:27:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@const={0x0, 0x0, 0x0, 0xd}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2}}]}}, &(0x7f0000000340)=""/142, 0x4e, 0x8e, 0x8}, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 11:27:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe84780") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) [ 308.332631][T11087] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 11:27:01 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe84780") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) [ 308.446280][T11094] BPF:[3] ARRAY (anon) [ 308.463748][T11094] BPF:type_id=4 index_type_id=2 nr_elems=0 [ 308.508373][T11094] BPF: [ 308.536502][T11094] BPF:Invalid elem [ 308.556474][T11094] BPF: [ 308.556474][T11094] 11:27:02 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:27:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000080)='$-\x00', 0x3) 11:27:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe84780") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100000001) 11:27:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:27:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:27:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) [ 309.307281][ T28] audit: type=1804 audit(1580210822.342:41): pid=11122 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/46/cgroup.controllers" dev="sda1" ino=16722 res=1 [ 309.314531][T11130] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 11:27:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100000001) 11:27:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) [ 309.672979][ T28] audit: type=1804 audit(1580210822.712:42): pid=11150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/47/cgroup.controllers" dev="sda1" ino=16713 res=1 11:27:03 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:27:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x690ee9b7eac96e29, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:27:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 11:27:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100000001) 11:27:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000000000)={0x20, 0xa, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 11:27:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, 0x0, 0x0) 11:27:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) [ 310.209322][T11170] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 310.267824][ T28] audit: type=1804 audit(1580210823.302:43): pid=11160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/48/cgroup.controllers" dev="sda1" ino=16737 res=1 11:27:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, 0x0, 0x0) 11:27:03 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x1, 0x0, 0x0, {0x4}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 11:27:04 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:27:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) 11:27:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:04 executing program 4: socketpair(0x2, 0x800, 0x5, &(0x7f0000000340)={0xffffffffffffffff}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b40)={0x0, @rand_addr, @remote}, &(0x7f0000000b80)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000bc0)={r1, 0x1, 0x6, @broadcast}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000680)=@newtfilter={0x480, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xf}}, [@TCA_RATE={0x6}, @filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x448, 0x2, [@TCA_BASIC_POLICE={0x444, 0x4, [@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x0, 0x0, 0x0, 0x0, 0x7}}}, @TCA_POLICE_RATE={0x404}]}]}}]}, 0x480}}, 0x0) 11:27:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, 0x0, 0x0) 11:27:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 11:27:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 311.133488][T11215] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 11:27:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) 11:27:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:04 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:27:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 11:27:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x80003, 0x80) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000240)={'ah\x00'}, &(0x7f0000000280)=0x1e) 11:27:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) 11:27:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0b") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 11:27:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x4) 11:27:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 11:27:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0b") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) [ 312.471282][ T28] audit: type=1804 audit(1580210825.512:44): pid=11275 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/52/cgroup.controllers" dev="sda1" ino=16742 res=1 11:27:05 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:27:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 11:27:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") socketpair(0x28, 0x1, 0x0, &(0x7f0000000080)) 11:27:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 11:27:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0b") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f000004bfe4)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000000)=0x278) 11:27:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 312.945883][ T28] audit: type=1804 audit(1580210825.982:45): pid=11292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/53/cgroup.controllers" dev="sda1" ino=16753 res=1 11:27:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 11:27:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 313.357914][ T28] audit: type=1804 audit(1580210826.402:46): pid=11314 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/54/cgroup.controllers" dev="sda1" ino=16743 res=1 11:27:06 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:27:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_SMAC={0xa, 0x4, @dev}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 11:27:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x0, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:27:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r2, r1, 0x0, 0x100000001) 11:27:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x0, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:27:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) [ 313.855400][ T28] audit: type=1804 audit(1580210826.892:47): pid=11329 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/55/cgroup.controllers" dev="sda1" ino=16762 res=1 [ 313.916885][T11329] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 313.959924][ T28] audit: type=1804 audit(1580210826.972:48): pid=11322 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir539425650/syzkaller.T5wvUI/79/cgroup.controllers" dev="sda1" ino=16760 res=1 11:27:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000700)=@upd={0xe0, 0x10, 0x0, 0x0, 0x0, {{'drbg-pr_sha1(%)\x00'}}}, 0xe0}}, 0x0) 11:27:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe84780") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:07 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:27:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe84780") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_WIPHY={0x8}]}, 0x24}}, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e02", 0x11) r1 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x42, 0x0) 11:27:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r2, r1, 0x0, 0x100000001) 11:27:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_SMAC={0xa, 0x4, @dev}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 11:27:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe84780") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:07 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, &(0x7f0000000040)=0x51) [ 314.806559][ T28] audit: type=1804 audit(1580210827.842:49): pid=11365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/56/cgroup.controllers" dev="sda1" ino=16771 res=1 [ 314.821742][T11365] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 11:27:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_int(r0, 0x1, 0xc, 0x0, &(0x7f0000000080)) 11:27:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) [ 315.070769][ T28] audit: type=1804 audit(1580210828.102:50): pid=11364 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir539425650/syzkaller.T5wvUI/80/cgroup.controllers" dev="sda1" ino=16770 res=1 11:27:08 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:27:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) 11:27:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r2, r1, 0x0, 0x100000001) 11:27:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_SMAC={0xa, 0x4, @dev}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 11:27:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:08 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) 11:27:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) [ 315.715208][ T28] audit: type=1804 audit(1580210828.752:51): pid=11403 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/57/cgroup.controllers" dev="sda1" ino=16760 res=1 [ 315.750944][T11403] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 11:27:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x20000000000000a, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) [ 315.953709][ T28] audit: type=1804 audit(1580210828.992:52): pid=11407 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir539425650/syzkaller.T5wvUI/81/cgroup.controllers" dev="sda1" ino=16771 res=1 11:27:09 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 11:27:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x20000000000000a, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) socket$inet(0xa, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 11:27:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r2, r1, 0x0, 0x100000001) 11:27:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_SMAC={0xa, 0x4, @dev}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 11:27:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket(0x20000000000000a, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:09 executing program 0: accept4$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000003400000e6ff040000000800090000000000"], 0x1c}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) [ 316.711613][ T28] audit: type=1804 audit(1580210829.752:53): pid=11452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir487608613/syzkaller.OjPPZs/58/cgroup.controllers" dev="sda1" ino=16770 res=1 [ 316.766222][T11452] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 11:27:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5400000030000100000000000000000020000000400001003c00010008000100696665002c0002801c000100000000000000000000e3"], 0x1}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 11:27:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) [ 316.975984][ T28] audit: type=1804 audit(1580210830.012:54): pid=11455 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir539425650/syzkaller.T5wvUI/82/cgroup.controllers" dev="sda1" ino=16771 res=1 [ 317.272458][ T28] audit: type=1804 audit(1580210830.312:55): pid=11486 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir657802998/syzkaller.PeXlgs/76/cgroup.controllers" dev="sda1" ino=16764 res=1 [ 317.281898][T11486] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 317.315129][T11486] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 317.325411][T11486] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 317.337339][T11486] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 317.345856][T11486] CPU: 1 PID: 11486 Comm: syz-executor.0 Not tainted 5.5.0-rc6-next-20200116-syzkaller #0 [ 317.355963][T11486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.367214][T11486] RIP: 0010:tcf_ife_cleanup+0x6e/0x400 [ 317.373035][T11486] Code: 48 c1 ea 03 80 3c 02 00 0f 85 94 03 00 00 49 8b bd f8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8d 67 e8 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5c 03 00 00 48 bb 00 00 00 00 00 fc ff df 48 8b [ 317.392821][T11486] RSP: 0018:ffffc900016d68b8 EFLAGS: 00010246 [ 317.398973][T11486] RAX: dffffc0000000000 RBX: ffffffff865917d0 RCX: ffffffff815c2c79 [ 317.407055][T11486] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000000 [ 317.415399][T11486] RBP: ffffc900016d6908 R08: 0000000000000004 R09: fffff520002dad05 [ 317.423771][T11486] R10: fffff520002dad04 R11: 0000000000000003 R12: ffffffffffffffe8 [ 317.431735][T11486] R13: ffff88809f9ce800 R14: ffff8880a459d000 R15: 0000000000000000 [ 317.439817][T11486] FS: 00007fa8f0739700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 317.448835][T11486] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.455411][T11486] CR2: 00007ffc40bb2e08 CR3: 00000000a16a8000 CR4: 00000000001406e0 [ 317.463734][T11486] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 317.471719][T11486] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 317.479703][T11486] Call Trace: [ 317.483008][T11486] ? unregister_ife_op+0x270/0x270 [ 317.488161][T11486] tcf_action_cleanup+0x62/0x1b0 [ 317.493109][T11486] __tcf_action_put+0xfa/0x130 [ 317.497971][T11486] __tcf_idr_release+0x59/0xf0 [ 317.502749][T11486] tcf_ife_init+0x97c/0x1870 [ 317.507482][T11486] ? tcf_ife_dump+0xc00/0xc00 [ 317.512182][T11486] ? tc_lookup_action_n+0xd2/0x100 [ 317.517505][T11486] ? lock_downgrade+0x920/0x920 11:27:10 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$inet(0x10, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000090002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffdf, 0x0) 11:27:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB='#'], 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0], 0x2) sendmmsg$inet6(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000258deb2987817e2900"/32], 0x34000) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/111, 0x6f}], 0x1}}], 0x1, 0x0, 0x0) 11:27:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3c, 0x0, &(0x7f0000000000)=0x278) 11:27:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 11:27:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_ife={0x3c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x5, @broadcast}]}, {0x4}}}]}]}, 0x54}}, 0x0) sendfile(r2, r1, 0x0, 0x100000001) [ 317.522447][T11486] ? __kasan_check_write+0x14/0x20 [ 317.527770][T11486] ? do_raw_read_unlock+0x3f/0x70 [ 317.532808][T11486] tcf_action_init_1+0x6b6/0xa40 [ 317.537768][T11486] ? tcf_action_dump_old+0x80/0x80 [ 317.543048][T11486] ? __nla_validate_parse+0x2d0/0x1ee0 [ 317.548601][T11486] ? is_bpf_text_address+0xac/0x160 [ 317.553937][T11486] tcf_action_init+0x21a/0x330 [ 317.558728][T11486] ? tcf_action_init_1+0xa40/0xa40 [ 317.563868][T11486] ? mark_lock+0xc2/0x1220 [ 317.568304][T11486] ? save_stack+0x23/0x90 [ 317.572795][T11486] ? __kasan_slab_free+0x102/0x150 [ 317.577922][T11486] ? kasan_slab_free+0xe/0x10 [ 317.582619][T11486] ? __kasan_check_read+0x11/0x20 [ 317.587913][T11486] tcf_action_add+0xf5/0x3b0 [ 317.592625][T11486] ? tca_action_gd+0x1760/0x1760 [ 317.597874][T11486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.604267][T11486] ? __nla_parse+0x43/0x60 [ 317.608844][T11486] tc_ctl_action+0x390/0x488 [ 317.613467][T11486] ? tcf_action_add+0x3b0/0x3b0 [ 317.618350][T11486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.624610][T11486] ? tcf_action_add+0x3b0/0x3b0 [ 317.629587][T11486] rtnetlink_rcv_msg+0x45e/0xaf0 [ 317.634971][T11486] ? rtnl_bridge_getlink+0x910/0x910 [ 317.640399][T11486] ? netlink_deliver_tap+0x226/0xbf0 [ 317.645864][T11486] ? find_held_lock+0x35/0x130 [ 317.650649][T11486] netlink_rcv_skb+0x177/0x450 [ 317.655690][T11486] ? rtnl_bridge_getlink+0x910/0x910 [ 317.661100][T11486] ? netlink_ack+0xb50/0xb50 [ 317.665973][T11486] ? __kasan_check_read+0x11/0x20 [ 317.671609][T11486] ? netlink_deliver_tap+0x248/0xbf0 [ 317.676923][T11486] rtnetlink_rcv+0x1d/0x30 [ 317.681893][T11486] netlink_unicast+0x59e/0x7e0 [ 317.695031][T11486] ? netlink_attachskb+0x870/0x870 [ 317.702166][T11486] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 317.709215][T11486] ? __check_object_size+0x3d/0x437 [ 317.714857][T11486] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 317.720868][T11486] netlink_sendmsg+0x91c/0xea0 [ 317.725832][T11486] ? netlink_unicast+0x7e0/0x7e0 [ 317.731149][T11486] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 317.736931][T11486] ? apparmor_socket_sendmsg+0x2a/0x30 [ 317.742718][T11486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.749482][T11486] ? security_socket_sendmsg+0x8d/0xc0 [ 317.754979][T11486] ? netlink_unicast+0x7e0/0x7e0 [ 317.760816][T11486] sock_sendmsg+0xd7/0x130 [ 317.766333][T11486] kernel_sendmsg+0x44/0x50 [ 317.771069][T11486] sock_no_sendpage+0x116/0x150 [ 317.776046][T11486] ? sock_kzfree_s+0x70/0x70 [ 317.781084][T11486] ? ext4_file_read_iter+0x465/0x620 [ 317.786774][T11486] ? find_held_lock+0x35/0x130 [ 317.791702][T11486] kernel_sendpage+0x92/0xf0 [ 317.796290][T11486] ? sock_kzfree_s+0x70/0x70 [ 317.801300][T11486] sock_sendpage+0x8b/0xc0 [ 317.805919][T11486] pipe_to_sendpage+0x2da/0x3c0 [ 317.811088][T11486] ? kernel_sendpage+0xf0/0xf0 [ 317.816219][T11486] ? direct_splice_actor+0x190/0x190 [ 317.822014][T11486] ? splice_from_pipe_next.part.0+0x2a2/0x350 [ 317.828436][T11486] __splice_from_pipe+0x3ee/0x7c0 [ 317.833814][T11486] ? direct_splice_actor+0x190/0x190 [ 317.840750][T11486] ? direct_splice_actor+0x190/0x190 [ 317.846321][T11486] splice_from_pipe+0x108/0x170 [ 317.851720][T11486] ? splice_shrink_spd+0xd0/0xd0 [ 317.857079][T11486] generic_splice_sendpage+0x3c/0x50 [ 317.863082][T11486] ? splice_from_pipe+0x170/0x170 [ 317.869671][T11486] direct_splice_actor+0x123/0x190 [ 317.875862][T11486] splice_direct_to_actor+0x3b4/0xa30 [ 317.881771][T11486] ? generic_pipe_buf_nosteal+0x10/0x10 [ 317.888279][T11486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.895204][T11486] ? do_splice_to+0x180/0x180 [ 317.900313][T11486] ? rw_verify_area+0x126/0x360 [ 317.905482][T11486] do_splice_direct+0x1da/0x2a0 [ 317.912705][T11486] ? splice_direct_to_actor+0xa30/0xa30 [ 317.918439][T11486] ? rw_verify_area+0x126/0x360 [ 317.923355][T11486] do_sendfile+0x597/0xd00 [ 317.927985][T11486] ? do_compat_pwritev64+0x1c0/0x1c0 [ 317.933917][T11486] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 317.940561][T11486] ? put_timespec64+0xda/0x140 [ 317.945937][T11486] ? __x64_sys_futex+0x404/0x590 [ 317.952483][T11486] __x64_sys_sendfile64+0x1dd/0x220 [ 317.958135][T11486] ? __ia32_sys_sendfile+0x230/0x230 [ 317.964034][T11486] ? do_syscall_64+0x26/0x790 [ 317.969320][T11486] ? lockdep_hardirqs_on+0x421/0x5e0 [ 317.974899][T11486] ? trace_hardirqs_on+0x67/0x240 [ 317.980020][T11486] do_syscall_64+0xfa/0x790 [ 317.984934][T11486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.991052][T11486] RIP: 0033:0x45b349 [ 317.995589][T11486] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.015442][T11486] RSP: 002b:00007fa8f0738c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 318.023880][T11486] RAX: ffffffffffffffda RBX: 00007fa8f07396d4 RCX: 000000000045b349 [ 318.031925][T11486] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000006 [ 318.040424][T11486] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 318.048755][T11486] R10: 0000000100000001 R11: 0000000000000246 R12: 00000000ffffffff [ 318.057064][T11486] R13: 00000000000008c9 R14: 00000000004ca1ed R15: 000000000075bf2c [ 318.065304][T11486] Modules linked in: [ 318.069430][T11486] ---[ end trace f90f2599d41e60b2 ]--- [ 318.075043][T11486] RIP: 0010:tcf_ife_cleanup+0x6e/0x400 [ 318.080877][T11486] Code: 48 c1 ea 03 80 3c 02 00 0f 85 94 03 00 00 49 8b bd f8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8d 67 e8 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5c 03 00 00 48 bb 00 00 00 00 00 fc ff df 48 8b [ 318.101225][T11486] RSP: 0018:ffffc900016d68b8 EFLAGS: 00010246 [ 318.108050][T11486] RAX: dffffc0000000000 RBX: ffffffff865917d0 RCX: ffffffff815c2c79 [ 318.116375][T11486] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000000 [ 318.124610][T11486] RBP: ffffc900016d6908 R08: 0000000000000004 R09: fffff520002dad05 [ 318.132928][T11486] R10: fffff520002dad04 R11: 0000000000000003 R12: ffffffffffffffe8 [ 318.141611][T11486] R13: ffff88809f9ce800 R14: ffff8880a459d000 R15: 0000000000000000 [ 318.149922][T11486] FS: 00007fa8f0739700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 318.159536][T11486] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 318.166585][T11486] CR2: 00007ffc40bb2e08 CR3: 00000000a16a8000 CR4: 00000000001406e0 [ 318.174990][T11486] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 318.183343][T11486] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 318.192225][T11486] Kernel panic - not syncing: Fatal exception in interrupt [ 318.202333][T11486] Kernel Offset: disabled [ 318.207514][T11486] Rebooting in 86400 seconds..