(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1fffffffc) 16:35:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x8}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 705.933430][ T7664] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 706.004669][ T27] audit: type=1804 audit(1594658115.042:1203): pid=7663 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/464/cgroup.controllers" dev="sda1" ino=16379 res=1 16:35:15 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc028020000300114c0500e1000c040009101a020200", 0x33a) 16:35:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1fffffffe) [ 706.188831][ T7681] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:15 executing program 5: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000300)={0x11, 0xc, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, 0x0) 16:35:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000003740)=[{&(0x7f0000002740)="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", 0x19b}], 0x1}}], 0x1, 0x0) 16:35:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x10}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1000020c3) 16:35:15 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011600500e1000c040009101a020200", 0x33a) [ 706.305936][ T27] audit: type=1804 audit(1594658115.342:1204): pid=7683 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/509/cgroup.controllers" dev="sda1" ino=16376 res=1 [ 706.340702][ T7683] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 16:35:15 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011680500e1000c040009101a020200", 0x33a) [ 706.395649][ T7695] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 706.500715][ T27] audit: type=1804 audit(1594658115.542:1205): pid=7694 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/465/cgroup.controllers" dev="sda1" ino=16367 res=1 16:35:15 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc028020000300116c0500e1000c040009101a020200", 0x33a) [ 706.563791][ T7706] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x8}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:15 executing program 3: r0 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) [ 706.718473][ T7711] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:15 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011740500e1000c040009101a020200", 0x33a) [ 707.040686][ T27] audit: type=1804 audit(1594658116.072:1206): pid=7686 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/509/cgroup.controllers" dev="sda1" ino=16376 res=1 16:35:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0xffffff1f00000000) 16:35:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0xb}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1000020f0) 16:35:16 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, 0x0, 0x0) 16:35:16 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc028020000300117a0500e1000c040009101a020200", 0x33a) 16:35:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x10}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:16 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000600e1000c040009101a020200", 0x33a) 16:35:16 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 16:35:16 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000900e1000c040009101a020200", 0x33a) 16:35:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000026d74b6c6bcfaa3600000000"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x5, 0x800, 0xff, &(0x7f0000000040)) sendfile(r2, r1, 0x0, 0x100000000) r3 = socket$xdp(0x2c, 0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 16:35:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x18}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:16 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000a00e1000c040009101a020200", 0x33a) 16:35:16 executing program 3: 16:35:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1000020f3) 16:35:17 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:17 executing program 3: 16:35:17 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011004400e1000c040009101a020200", 0x33a) 16:35:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) 16:35:17 executing program 3: 16:35:17 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011005a00e1000c040009101a020200", 0x33a) 16:35:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1000020f4) 16:35:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:17 executing program 3: 16:35:17 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011006300e1000c040009101a020200", 0x33a) 16:35:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x8}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:18 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:18 executing program 3: 16:35:18 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011006900e1000c040009101a020200", 0x33a) 16:35:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xb}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)={0x24, 0x0, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r3}, @NL80211_ATTR_TXQ_QUANTUM={0x8}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_KEY(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)={0x50, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x3}, @NL80211_ATTR_KEY_SEQ={0x10, 0xa, "98a301f81b9ec1ab90d0e732"}, @NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_IDX={0x5, 0x2, 0x3}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040c11}, 0x26008840) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040)=0x7fff, 0x4) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="58000000020601000000000000000000000000000900020073797a951f77106fa99e3d93330876320000000014000300686173683a69702c706f72742c6970000c0007c0080012409effffff050001000700000005000400000000000500050002000000"], 0x58}}, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000fd00", @ANYRES16=0x0, @ANYBLOB="00000000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYRES16=r5], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r1, 0x0, 0x100000000) 16:35:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100003000) 16:35:18 executing program 3: 16:35:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x10}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:18 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000400e1000c040009101a020200", 0x33a) 16:35:18 executing program 3: r0 = socket(0x10, 0x80002, 0x2) bind$netlink(r0, &(0x7f0000177ff4), 0xc) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) [ 709.114342][ T27] kauditd_printk_skb: 6 callbacks suppressed [ 709.114355][ T27] audit: type=1804 audit(1594658118.152:1213): pid=7817 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/513/cgroup.controllers" dev="sda1" ino=16367 res=1 16:35:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c009000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB], 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) 16:35:18 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000600e1000c040009101a020200", 0x33a) [ 709.473894][ T27] audit: type=1804 audit(1594658118.512:1214): pid=7839 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/514/cgroup.controllers" dev="sda1" ino=16373 res=1 16:35:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20001732, &(0x7f00000003c0)={0x2, 0x4e20, @local}, 0x10) 16:35:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x14}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:18 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000900e1000c040009101a020200", 0x33a) 16:35:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100003f00) 16:35:18 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) read$alg(r2, &(0x7f0000000200)=""/96, 0x60) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) 16:35:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x102}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:19 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000a00e1000c040009101a020200", 0x33a) [ 710.021161][ T27] audit: type=1804 audit(1594658119.062:1215): pid=7860 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/470/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 710.084765][ T27] audit: type=1804 audit(1594658119.092:1216): pid=7865 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/515/cgroup.controllers" dev="sda1" ino=16384 res=1 [ 710.118060][ T7874] validate_nla: 17 callbacks suppressed [ 710.118070][ T7874] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 710.137008][ T7874] __nla_validate_parse: 27 callbacks suppressed [ 710.137018][ T7874] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:19 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011004400e1000c040009101a020200", 0x33a) 16:35:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x103}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x201}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100004000) [ 710.314792][ T7880] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 710.360090][ T7880] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 710.526703][ T27] audit: type=1804 audit(1594658119.562:1217): pid=7888 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/471/cgroup.controllers" dev="sda1" ino=16383 res=1 16:35:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20040084, &(0x7f0000000e00)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20004815, 0x0, 0x0) 16:35:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x202}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:19 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011005a00e1000c040009101a020200", 0x33a) 16:35:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='io.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000567000/0x3000)=nil, 0x3000, 0x3000002, 0x10010, r0, 0x8fde2000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) 16:35:19 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) [ 710.840758][ T7904] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 710.855179][ T7904] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x203}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:20 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:20 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011006300e1000c040009101a020200", 0x33a) [ 711.092585][ T7917] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x300}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:20 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100005000) [ 711.181716][ T7917] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:20 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011006900e1000c040009101a020200", 0x33a) [ 711.382365][ T7928] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 711.393810][ T7928] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 711.439177][ T27] audit: type=1804 audit(1594658120.482:1218): pid=7925 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/472/cgroup.controllers" dev="sda1" ino=16364 res=1 16:35:20 executing program 3: syz_emit_ethernet(0x22, &(0x7f0000000000)={@dev, @random="924ba3ef1cd2", @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @dev, "", @broadcast}}}}, 0x0) 16:35:20 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x301}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x10000dfff) 16:35:20 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000502e1000c040009101a020200", 0x33a) 16:35:20 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5411, &(0x7f0000000000)={'ip_vti0\x00', 0x0}) 16:35:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x302}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000040)=0x3) r2 = ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x64, r4, 0x536ae464467e3e0b, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x64}}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$DEVLINK_CMD_RELOAD(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)={0x38, r4, 0x0, 0x0, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r2}}]}, 0x38}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x40000) socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) recvfrom$packet(r1, &(0x7f0000000200)=""/130, 0x82, 0x120, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendfile(r6, r1, 0x0, 0x100000000) [ 712.001903][ T7950] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 712.047516][ T7950] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:21 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000002300)={0x0, 'bond0\x00', {}, 0x7}) pipe(0x0) r4 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(r4, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[@ANYBLOB="15000000", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fbdbdf2502000000"], 0x14}, 0x1, 0x0, 0x0, 0x40050}, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={&(0x7f0000008f80)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000009180)={&(0x7f0000001480)=ANY=[@ANYBLOB="800000005046422bf97e2cff84ad", @ANYRES16=0x0, @ANYBLOB="b5452bbd7000fedbdf25100000000400028040000180060002000c000000060004004e2200000c000700090000000400000008000b00216970000600040000000000070006006e71000008000b007369700008000400020000000800060000000000040002800c000180060004004e21000008000400fdffffff38ac12497152320aa9708f5e049c0305603018919cd48b80f3a2bb3775efe97dfba7c43d7a8ee4216b27543f254c00885139c2d270e4bf5946d0d4376a54d5b54d7f00000000562e280e04c7d65675688c3ad5a67be5fa34bd3335f3c4eeba4ab4bb9125a8705b080000000000000000"], 0x80}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x4c, r5, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffe00}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'macvlan1\x00'}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000580)="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", 0xf00}], 0x1) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 16:35:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x303}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 712.105690][ T27] audit: type=1804 audit(1594658121.132:1219): pid=7953 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/473/cgroup.controllers" dev="sda1" ino=16370 res=1 16:35:21 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000503e1000c040009101a020200", 0x33a) [ 712.186374][ T7955] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 712.193819][ T27] audit: type=1804 audit(1594658121.202:1220): pid=7955 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/517/cgroup.controllers" dev="sda1" ino=16364 res=1 16:35:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x402}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 712.310366][ T7965] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 712.312829][ T27] audit: type=1804 audit(1594658121.322:1221): pid=7964 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/470/memory.events" dev="sda1" ino=16384 res=1 [ 712.351191][ T7965] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x403}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 712.457179][ T27] audit: type=1800 audit(1594658121.332:1222): pid=7964 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16384 res=0 16:35:21 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000504e1000c040009101a020200", 0x33a) 16:35:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x500}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:21 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x10000f0ff) [ 712.788170][ T7987] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x3, 0x2}, &(0x7f00000000c0)=0x8) 16:35:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x501}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 712.852559][ T7987] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x502}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 713.085586][ T7996] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 713.124847][ T7996] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:35:22 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000505e1000c040009101a020200", 0x33a) 16:35:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x503}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:22 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r1, @ANYBLOB="0000000600028227b3cbafdf1c3774f3da3a2786"], 0x48}}, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000540)=@newtaction={0x3e68, 0x30, 0x400, 0x70bd25, 0x25dfdbff, {}, [{0x25fc, 0x1, [@m_skbmod={0x170, 0xa, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0xac, 0x2, 0x0, 0x1, [@TCA_SKBMOD_DMAC={0xa, 0x3, @multicast}, @TCA_SKBMOD_SMAC={0xa, 0x4, @local}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x9, 0x0, 0x2, 0x40, 0x6c32}, 0xd}}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x0, 0xc0, 0x10000000, 0x83e, 0x1}, 0x6}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x3}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x4, 0xe0, 0x4, 0x3, 0x6}, 0xa}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4b4}, @TCA_SKBMOD_SMAC={0xa, 0x4, @random="fe3d421c803f"}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x800}]}, {0x99, 0x6, "57b95d8fdf16cbe9ebfb1f6fe008bf910d2a894793afd9ad4e208b44143a678d359d02b9723cd1d18c2170b0edf7f29d19cbf23f4eadbee41a3c0f923028f53887fb0def8ee95e02706915c0ed495967f13e4f9cf6af294366d825e6f8460d9ccafcef1085d160ab4f87b889fcf2228ea2241bb93d29d64fc200639eedeea6661c6ee72192e620a1ca89586303fa9bb873d812674f"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_pedit={0x1ef8, 0x6, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xecc, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xec8, 0x2, {{{0xfff, 0x1, 0x3, 0x7f, 0x7}, 0x7f, 0x9, [{0x3, 0x400000, 0x4, 0x4, 0x3, 0x3}, {0x0, 0x100, 0x6, 0x40, 0x0, 0x8}, {0x3ff, 0x6c54d4ee, 0x1f, 0x8001, 0x1000, 0x20}, {0x3ed, 0x6b, 0xfff, 0x1000, 0x6, 0x1}, {0x7f, 0x100, 0x286400, 0x1000, 0x3ff, 0x6}, {0x5, 0xcf, 0xffff, 0x596, 0x4, 0x401}, {0x7f, 0x4, 0xffffff01, 0x20, 0x6, 0x7}]}, [{0x1, 0xa66d, 0xffffd27e, 0x8, 0xc46, 0x6}, {0x4d7, 0x5, 0x8001, 0x927a, 0x1, 0x9}, {0x8000, 0x0, 0x1, 0xfb, 0x9, 0x1}, {0x2, 0x1, 0x8, 0x3, 0x8, 0x5}, {0x40, 0x263, 0x8, 0x97, 0xc6, 0x5}, {0x4, 0x10000, 0x5, 0x101, 0xd3, 0x81}, {0x5, 0x7fff, 0x400, 0x4365, 0x2, 0x5}, {0x4, 0x2, 0x9, 0x5, 0x1, 0x8}, {0xfc6, 0x0, 0x22d, 0x4, 0x8, 0xfffffffc}, {0xfffffe01, 0x40, 0x0, 0x6, 0x3, 0xffffff7a}, {0x344, 0x3ff, 0xab2, 0x4, 0x92a, 0x10000}, {0x7, 0x100, 0x3, 0x3, 0x5, 0xfffffffe}, {0x0, 0x2, 0x0, 0xfffffffc, 0x8, 0x1004000}, {0x0, 0xb08, 0x27e, 0x2, 0x8, 0x1}, {0xffffffc1, 0x62, 0x80, 0x9893, 0x1, 0x101}, {0x5, 0x51, 0x2, 0x0, 0x5, 0x8}, {0x5, 0x4, 0x9, 0x5, 0x2, 0x3}, {0x4, 0x7080, 0x80, 0x8, 0x57f, 0xffffffff}, {0x7, 0x2, 0x5, 0x4, 0xf79, 0x1}, {0x3, 0x1, 0x80000001, 0x40, 0x9, 0x1ff}, {0x9, 0x1, 0x3ff, 0x347a, 0x8, 0x6}, {0x200, 0x9f9e, 0x1000, 0x3f, 0x3, 0x7ff}, {0x98, 0x4de, 0xab, 0x4, 0x6, 0x1530}, {0x4, 0x67, 0x80000000, 0xfffffffd, 0xc8f, 0x80}, {0x80, 0x44d, 0x8, 0x8000, 0x65, 0x8}, {0x945, 0x7f, 0x101, 0x3ff, 0x7, 0x9}, {0x5, 0x3, 0x501, 0x5, 0x80000000, 0x1}, {0x69ae, 0x6, 0xc64d, 0x80000000, 0x8, 0xfffffc00}, {0x13b, 0x8, 0x5, 0x1, 0x800, 0x8001}, {0x7fffffff, 0x4, 0x800, 0x6, 0x6, 0x6}, {0x7fffffff, 0x4, 0x1, 0x3f, 0x5, 0x5}, {0x1, 0x9, 0x100, 0x7, 0x9, 0x8000}, {0x4, 0x6, 0x0, 0x8, 0x9, 0x9}, {0x8, 0x40, 0x4256, 0x16, 0x0, 0x1dc2}, {0x1, 0x164, 0x1, 0x0, 0x0, 0x2}, {0x20, 0x81c5, 0xffff, 0x2, 0x5c58, 0x16c86995}, {0x80000000, 0xc, 0x1f, 0x7, 0x4, 0x8}, {0x6, 0x3ff, 0xa7b, 0x8000, 0x8, 0x1}, {0x9, 0x9, 0x1, 0x3, 0x6e, 0x200}, {0x9, 0x8000, 0x2, 0x2, 0x401, 0x49}, {0x100, 0x6, 0x7, 0xd7, 0x1}, {0x4, 0xf524, 0x9, 0x2, 0x41e3, 0x6}, {0x1c, 0xc03, 0x5, 0x2a, 0x5, 0x7}, {0xbeb, 0x0, 0x76a, 0x3, 0x19c, 0x5}, {0x0, 0x4, 0x5, 0xfffffffe, 0x5, 0xffffff00}, {0x100, 0x5, 0x1, 0xae1, 0x1, 0x800}, {0x7d2b, 0x6, 0x1, 0x80000000, 0x2, 0x8b}, {0x900, 0x9, 0x6, 0x101, 0x9, 0x551e}, {0x5, 0x3, 0x0, 0x2, 0x6, 0xc3}, {0x8, 0xff, 0x9, 0xffffa9c2, 0x4, 0x4}, {0x2, 0x2, 0xffffffff, 0x6, 0x2, 0x965}, {0x3b328b52, 0x7, 0x1, 0xad4, 0x80000001, 0x4}, {0x5f, 0x10000, 0x2, 0x9, 0x3, 0x6}, {0x1, 0x2, 0x4, 0xa9, 0x81, 0x6}, {0x626, 0x5, 0x81, 0x47, 0x3f, 0x7}, {0x5, 0x401, 0x400, 0x9, 0x0, 0x8000}, {0x8000, 0x0, 0x7, 0x1, 0x80000001, 0x4}, {0x6, 0x28, 0x0, 0x57, 0x8, 0x3}, {0x80, 0x3, 0x10001, 0x3ff, 0x4, 0x5a9b3aa5}, {0x100400, 0x8, 0x1, 0xfffffffe, 0xb03}, {0x80000000, 0x9, 0x8, 0xcbed, 0x9, 0x2dc}, {0x4, 0xfff, 0x9, 0xff, 0x0, 0x10000}, {0x81, 0x5, 0x9, 0x4, 0x5c6e, 0x7}, {0x6, 0x3ff, 0x9, 0x7, 0x3b34f7b5, 0x7fff}, {0x6, 0x901, 0xff, 0x5, 0x20, 0x894}, {0x0, 0x3, 0x9, 0x6, 0x5, 0x3}, {0x0, 0x1, 0x80000000, 0x9, 0x8000, 0x7fff}, {0x87a7, 0xfffff7aa, 0x8, 0x8000, 0x2, 0xfffffffa}, {0x8, 0x417c, 0x8, 0x76, 0x1, 0x9}, {0x6, 0xff, 0x1, 0xb561, 0x5, 0x1c1}, {0x80000000, 0x4, 0x7, 0xffffffff, 0x4, 0xffffffff}, {0x6, 0x9, 0x8, 0x8a, 0x400}, {0xffff, 0x0, 0xabe6, 0x480, 0x9, 0x7}, {0x3ff, 0xdf7, 0x3, 0xfffffc00, 0x7, 0x3ff}, {0x0, 0x0, 0x5b0, 0x4, 0x7ff, 0x8}, {0xe5, 0x9e, 0x1, 0x3, 0xfb8, 0x4}, {0xb82, 0x7ff, 0xa9, 0xffffffff, 0x3, 0x7fffffff}, {0x8000, 0x9000000, 0x8001, 0x4af, 0x13c37000, 0x38}, {0x3, 0x9, 0x6ff, 0x80000000, 0x9, 0x40000000}, {0x5, 0x1, 0x9, 0x8, 0x3, 0x2069faa8}, {0x1, 0x3af5696c, 0x7, 0xffffffff, 0x5, 0x3}, {0x2dd6, 0x8000, 0x9, 0x40, 0x20, 0x8}, {0x7, 0x5, 0xd5, 0x8000, 0x4, 0x66c7}, {0x1, 0x2, 0x6, 0x6, 0x5, 0x2f7a}, {0x10001, 0x2, 0x8, 0x400, 0x5, 0x50a}, {0x8, 0x3, 0x5, 0x6, 0x800, 0x5}, {0x800, 0x80000001, 0x80000001, 0xfffffffc, 0xfffffffe, 0x2}, {0x6, 0x1, 0xab, 0xffff, 0xd6000, 0xffff}, {0x3, 0x9, 0xff, 0x9, 0x6, 0x4}, {0x9c36, 0x4, 0x0, 0xfffffff7, 0x80, 0x7}, {0x4, 0x80000000, 0x9, 0x8, 0x9, 0x404}, {0x1, 0xc498, 0x81, 0x3, 0x100, 0xfff}, {0x3, 0x3, 0x7, 0x7, 0x3, 0x9}, {0x1, 0x8000, 0x1, 0x7fffffff, 0x9, 0x8}, {0x6, 0x401, 0x7, 0xec, 0x80ba, 0xfffffbff}, {0x23, 0x9, 0x8b1, 0x3, 0x7, 0x6}, {0xd7, 0x5a6f, 0x8, 0x8000, 0x5, 0x400}, {0x4, 0x4777, 0xf411, 0x2, 0x7513, 0xdfb}, {0xfffffffd, 0xe04c, 0x20, 0x7, 0x0, 0xff}, {0x1, 0x4db9, 0x0, 0xffff8001, 0x0, 0xa0}, {0x8, 0x0, 0x101, 0x8, 0x3, 0x80000001}, {0x4, 0x7, 0x7, 0x9, 0x4, 0x401}, {0x4, 0x1, 0xd46, 0x8, 0x8001, 0x3}, {0x7, 0x8, 0x400, 0x80, 0x40, 0x7}, {0x9, 0x2, 0x3, 0x1, 0x6, 0x10001}, {0x0, 0x200, 0x9, 0x1, 0x5, 0x2}, {0x7, 0x9, 0x3, 0x7, 0x100, 0xfff}, {0x5, 0x8, 0x4, 0x6, 0x2, 0x9}, {0x3, 0xe54, 0x0, 0x6, 0xf8b1, 0x4}, {0x400, 0x80, 0x5, 0x4, 0x1, 0xb265}, {0x4, 0x0, 0x2, 0x9250, 0x0, 0x4}, {0x0, 0x3, 0x4e53, 0x10001, 0x1ff, 0x80000000}, {0x5, 0x9, 0x1000, 0x7fffffff, 0xef, 0xfff}, {0x4, 0x4, 0x9, 0x400, 0x3, 0x200}, {0x4, 0x5, 0xfffffffa, 0xd0b, 0x40, 0xff}, {0x8, 0x4, 0x9, 0x9, 0x80000000, 0x20d}, {0x80, 0x800, 0xcb6, 0x7, 0x0, 0x4}, {0x0, 0x10adef80, 0xe81, 0x400, 0x4, 0x6}, {0x6, 0x4, 0x3, 0x5, 0x3, 0x1c3f}, {0x2, 0x4d2, 0x1, 0x1, 0x101, 0x8001}, {0xff, 0xfffffc01, 0x9, 0x8, 0x1, 0x3}, {0xffffffff, 0x6, 0x5, 0x370f4dbe, 0x2, 0x3}, {0x6, 0x8932, 0x5, 0x3f, 0x7fff, 0x9}, {0x1, 0x10000, 0x10000, 0x0, 0x4, 0x3}, {0x37bf13d6, 0x10000, 0xc644, 0x1, 0x3ff, 0x1}, {0x4, 0xe01, 0x0, 0x4, 0x400, 0x7fff}, {0x40, 0x100, 0xfffffffa, 0x3, 0x6, 0x8000}, {0xbe1, 0xe, 0xe98, 0x4da, 0x80000000, 0x8}], [{0x1, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x5}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {}, {0x4}, {0x3}, {0x5, 0x1}, {0x0, 0x1}, {}, {0x3}, {0x5}, {0x2}, {0x0, 0x1}, {0x1, 0x3}, {0x5, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x3}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x4}, {0x1, 0x1}, {0x0, 0x1}, {0x3}, {0x0, 0x1}, {0x0, 0x1}, {0x2}, {0x4}, {0x5, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x2}, {0x5}, {0x2, 0x1}, {0x4}, {}, {0x0, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x2}, {0x5, 0x1}, {0x4, 0x1}, {0x5}, {0x2}, {}, {}, {}, {0x4}, {0x434d043b33572fea, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {}, {}, {0x5}, {0x3, 0x781f3c0450ab2a0c}, {0x2}, {0x0, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {}, {0x3}, {0x4}, {0x4, 0x1}, {0x3}, {0x2}, {0x4, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {}, {0x4, 0x1}, {0x4}, {0x1}, {0x3}, {0x5}, {}, {0x5, 0x1}, {}, {0x3, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x4}, {0x2, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x2}, {0x0, 0x1}, {0x6}, {}, {0x2, 0x1}, {}, {0x5}, {0x0, 0x1}, {0x1}, {0x4, 0x1}, {0x7}, {0x3}, {0x1}, {}, {0x2}, {0x2, 0x1}, {0x5}, {}, {0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x6}, {0x3, 0x1}]}}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_skbedit={0x188, 0xf, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x6c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x1, 0xc2a, 0x7, 0xfff, 0x81ff}}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x91b, 0x400, 0x5, 0x6, 0x80}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0xff}, @TCA_SKBEDIT_PTYPE={0x6}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x1, 0x1, 0x0, 0x1, 0x1}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x8}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x9}]}, {0xf1, 0x6, "8b76fb299890bf8f363766eefa2ac9c247acabe168fb01c503cd7a3bee787abb6255eadb4c5861078e31fbfd28380292be59d897f584012755c232ac26517e38032ef9274bcdb53af809720a79a2e45af09b9ff7c833e05d8e3e2705494144dfce306fb32e2d31e4eaf8606f752f5ed7e85f116465104fbd8f4a2578eb079349924f45fdb07f3632abbc955f481994b99b4f8172a1ffd581ed9d3dc9ab7e3098812c79fb02f9e674c7e9e12f39828e4525f3e2e19e54c3eb1c85d578cfa6faee853175f2d337212d4f7115229a0c85b35df929eece7520faa579e750753a0aad201edccf24c8c67819d782d5a3"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_sample={0x12c, 0xe, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x80000000}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x1}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8}, @TCA_SAMPLE_RATE={0x8, 0x3, 0xfffffff9}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x6}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x200}]}, {0xcd, 0x6, "d196c78f5edb9760df44ba3654b39506c5a59abfcf4c36942e88138894ff7ede50169f7da65e1e11335582d33a73b11683b0663f4897e6624048a4f3152ecb95431cff84a297ab302df7cd3386abcc9671ed9f3ebc5add332c554a9653126b0911c06b0dfcfbefe27934c5fe90f2ca9e75091d696b1f3ad5cf7cbe1773672c6004afc6df3604a93fe7338b5b954809d6ad17f12a1f5433c4a944d6e16e13bc06a528b8745f9aca447d773800579370a13ed1a237faf287a1340eb7ed7274c3ed12564581dc09adf4c9"}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_xt={0x120, 0xd, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x40, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_INDEX={0x8, 0x3, 0x4}, @TCA_IPT_TARG={0x2a, 0x6, {0x33e9, 'raw\x00', 0xff, 0x6}}]}, {0xba, 0x6, "5d8d91c7d0e9903970f0c0ca69c49fb627792687f19bccccee956767085ad498f2e980013aab649b0979c485f75602712fe13c5ad2d8418a992a0fe0b059e99a820970ff69cc24147a6e96aa9ad81c9a0e0ef9cbbd448f69a52d5a6acaf773eae19da94fedb4f02340d9da558883f08758f2f6ede0ef375f59d6551a7f8c26134a72def4e10cd2aa008b2494a2135f2779e08e61bc0aeef326944fc9d1dec18ec18025f0c85cc1c050a7bbd9a230991a0a3fe490df0c"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_skbedit={0xe8, 0x5, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x7, 0xb}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x2}]}, {0xa3, 0x6, "3b8b39d049efd99793000cd6999e71ef77943a5a66458555bee7d0e087034248fc6dce006f58c236b696693477239e784363476ca2efd53f5b6b062dc45ed49ec0f6330a4fd9caa15661a915c9078f9c623fddf41c1fb0a5a4fbea3c5c9c2cd827013be513299df88682190a3bba93eb455e99435b9455ede5d05924fd5eeac81fb9f496447cb69118cab08990c174f351f4a7c22507b0e437a1a43d7a4ebc"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_ct={0x80, 0x20, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_CT_LABELS={0x14, 0x7, "1aa1f4b0434f00035f588b8b9037e3e6"}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @mcast1}]}, {0x30, 0x6, "d160b43f41c7cf081a409a465a00156e347ae3a4e972529f7f9e20fb168c8f20af44ec3b93317f649473df29"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_tunnel_key={0x54, 0x10, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @empty}]}, {0x7, 0x6, "94e182"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}, {0x1858, 0x1, [@m_skbedit={0xb0, 0x7, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x4c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xc, 0xffe0}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x4}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x6}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x2, 0xffe0}}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x81}, @TCA_SKBEDIT_PTYPE={0x6}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x5, 0xfff3}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x6}]}, {0x39, 0x6, "4a92fec94cbfbe88e6a6649f757890c5459a8a11b902184f7e93ac58261c184f1c7f0849242d44dbe6fccef970f06b2ef7c547b2dd"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}, @m_ipt={0xac, 0x19, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x54, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x1}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}]}, {0x32, 0x6, "c1ac83f268e3ee4417a3fbb8cb939cbb5e6b1f2d6182daa5778cb88caa107fd028e33627937448eab2dc17e15074"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_ct={0x178, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x58, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @mcast2}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @dev={0xac, 0x14, 0x14, 0x3a}}, @TCA_CT_LABELS={0x14, 0x7, "d8b3d3ef66ba0fe9b2c4d482d1876eac"}, @TCA_CT_MARK={0x8, 0x5, 0x7f}, @TCA_CT_MARK_MASK={0x8, 0x6, 0x401}, @TCA_CT_LABELS={0x14, 0x7, "0eca8f3f3239e9c1a48a10064fa80e20"}]}, {0xf9, 0x6, "c6cd61f27780cc1925042c7b8fab34d42e911a11b815f0cd041e41c203c7152829a383b4606fd84edea112c327f9ef05fb9642be643dbca871aeb51f0036dd46ad12eebf876d9fc7ad66f1d80413f8a2fff59296eacfd27560840a87827293eea2e13eff3bc2a7ba72e53f43e27eaea46152fdb70e243d137b1c99912a96d08c415ed3e9b26836b7f1283af782328993d7714c5aca1b163f3fc56ceb7c6f2248078da5531050ce73590331e0c3948b52349a706bee14acd677e3d65b6f03c20bb34a5b2cc43a3589fcad3d3ec60ab0a2aa0bef66e29d78774b71b18e233331c267321e64e012d01b27209d9a563e0b42f9abfb1bd9"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_xt={0x184, 0xa, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0xa4, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0x6}, @TCA_IPT_INDEX={0x8, 0x3, 0x8001}, @TCA_IPT_TARG={0x38, 0x6, {0x7, 'raw\x00', 0x0, 0x5, "45ba6f033f24b9766b1ea68b2e2d"}}, @TCA_IPT_TARG={0x56, 0x6, {0xfff, 'raw\x00', 0x2, 0xffff, "44d007de9b9609791dd2dce36284d8ddadacd9da068efd50b8afa610d542e3a9589d491783f86addc592076b"}}]}, {0xbb, 0x6, "12103814f7b85584f53fc2ae0a5b56e3c124b70f0bdda772acd2b4922a74eae6bbbe8bd4145c7a17d098fe635d978953fbb7ace461857e90888791cb6b9fb21070475a8f69a94c77bdbd906be258f572e921584cac945778713a32d8c9571bf9008a7c81cb559ffac2bf657fadaf4ff48a557a6e555f1e326f26e3fffb1698c68751ccec727e17d15c5edfbb8aa363ca4f6280b1c2abef71901d5a8b3a79c1378b23d4d83f979a3f4f76e06f8cfc368a75fa68c538baf9"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0xbe9eae3b1077edfa}}}}, @m_mirred={0x1090, 0xb, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0xc031, 0x7, 0x80000000, 0x7d0f}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x1, 0x0, 0x2, 0x692}, 0x3, r1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x7, 0x1, 0x5, 0x3, 0xb7}, 0x2, r6}}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_csum={0x15c, 0x1e, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x11c, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0xbb79, 0x7, 0x2, 0x6d, 0x3}, 0x29}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x8, 0x7, 0x2, 0x3ff, 0x3f}, 0x7f}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x3, 0xd4, 0x4, 0x7, 0x3ff}, 0x18}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x7fffffff, 0xfffffc00, 0x10000000}, 0x22}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x20, 0x9, 0x1, 0xffff885f, 0x3}, 0x18}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1f, 0x4, 0x10000000, 0x7dc13b60, 0x9}, 0x35}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xe8c, 0xe, 0x2, 0x3ff, 0x5}, 0x37}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x27c, 0x7f, 0x2, 0x7, 0x21300000}, 0x3a}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x4, 0x5, 0x3, 0xffffffc1, 0x100}, 0x65}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xc0000000, 0x80000000, 0x0, 0x4, 0x7}, 0x4}}]}, {0x18, 0x6, "51b533478ec51a2126684b9a63245f9e11cd5ad2"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_tunnel_key={0x170, 0x17, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0xa4, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x51, 0x902, 0x10000000, 0x1, 0x7f}, 0x2}}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @private2}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x4}, @TCA_TUNNEL_KEY_NO_CSUM={0x5, 0xa, 0x1}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @multicast1}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @mcast1}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @private2={0xfc, 0x2, [], 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @mcast2}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @broadcast}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @dev={0xfe, 0x80, [], 0x31}}]}, {0x9d, 0x6, "3ce7133c96cb99dfda084938c697624b9c147aca2c48a6d485b82f9ee5ede016bf5a1900eaf379bd30fe74c5e0c17e15ac96ab442ddcdc54bba5faa7e61f65998d7b5886f2e595a0bba475a282b87eb7e5b007bbf9a0fc43585c203bb8b5137361905e03ca2e5af704901c71ea23d089d8d77fd635a67b6c4cf38dce4cd15ffd33db56557de37fd7b14bb78348d3a68dc98ada1a601492c533"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_gact={0xa0, 0x15, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x70, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x2d800000, 0x697, 0x7, 0x5, 0x6}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x652, 0x1}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1a5b, 0x6}}, @TCA_GACT_PARMS={0x18, 0x2, {0x5, 0xff, 0x6, 0x0, 0x8}}, @TCA_GACT_PARMS={0x18, 0x2, {0x10000, 0x1f, 0x3, 0x1, 0x1}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0xf72, 0x1}}]}, {0x5, 0x6, 'd'}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}]}]}, 0x3e68}, 0x1, 0x0, 0x0, 0x8800}, 0x40) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f0000000140)=0x2, 0x4) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r3, &(0x7f0000000040)={0x2c, 0x0, r7}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r8, &(0x7f00000002c0)={0x0, 0xe60, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r9}}, 0x20}}, 0x0) 16:35:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x600}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 713.378859][ T8013] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:22 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000506e1000c040009101a020200", 0x33a) 16:35:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="4800000010000507006d2a2e280c73dd15e7e95f", @ANYRES32=r2, @ANYBLOB="00f0000000000000280012000c00010076657468"], 0x48}}, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) shutdown(r3, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={[], [], @empty}}, 0x1c) listen(r3, 0x100000000000012) sendmmsg$inet(r3, &(0x7f0000004c40)=[{{&(0x7f0000000b80)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10, &(0x7f00000020c0)=[{&(0x7f0000000bc0)="89", 0x1}], 0x1}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e23, @remote}]}, &(0x7f0000000180)=0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRESDEC=r3, @ANYBLOB="000000000000000008000a0010"], 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x5c, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5, 0x2}}, 0x20}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x3f2, 0x200, 0x70bd27, 0x25dfdbfe, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8000}, 0x4000011) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x900, &(0x7f0000000280)={&(0x7f0000000740)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) 16:35:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x601}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:22 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x10000f300) 16:35:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x88, 0x0, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x593}}, @NL80211_ATTR_MESH_CONFIG={0x34, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8, 0xb, 0x54}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xc}, @NL80211_MESHCONF_PLINK_TIMEOUT={0x8, 0x1c, 0x5}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x1}, @NL80211_MESHCONF_CONFIRM_TIMEOUT={0xfffffe13, 0x2, 0x87}]}, @NL80211_ATTR_MESH_CONFIG={0x34, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_CONFIRM_TIMEOUT={0x0, 0x2, 0xcc}, @NL80211_MESHCONF_AUTO_OPEN_PLINKS={0x5, 0x7, 0x8}, @NL80211_MESHCONF_HWMP_CONFIRMATION_INTERVAL={0x6, 0x19, 0x996}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x3}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x400}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x8050}, 0x4000081) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000000) 16:35:22 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000507e1000c040009101a020200", 0x33a) 16:35:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x602}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:22 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000508e1000c040009101a020200", 0x33a) 16:35:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x603}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:23 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x10000f5ff) 16:35:23 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000509e1000c040009101a020200", 0x33a) 16:35:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x700}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:23 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc0280200003001100050ae1000c040009101a020200", 0x33a) [ 714.232205][ T27] kauditd_printk_skb: 9 callbacks suppressed [ 714.232219][ T27] audit: type=1804 audit(1594658123.272:1232): pid=8068 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/476/cgroup.controllers" dev="sda1" ino=16381 res=1 16:35:23 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x701}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet6_dccp_int(r0, 0x21, 0x1, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendfile(r2, r1, 0x0, 0x100000000) 16:35:23 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc0280200003001100050ce1000c040009101a020200", 0x33a) 16:35:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x10000faff) 16:35:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x702}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 714.699096][ T27] audit: type=1804 audit(1594658123.742:1233): pid=8089 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/520/cgroup.controllers" dev="sda1" ino=16376 res=1 16:35:23 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc0280200003001100050ee1000c040009101a020200", 0x33a) [ 714.815136][ T27] audit: type=1804 audit(1594658123.852:1234): pid=8098 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/477/cgroup.controllers" dev="sda1" ino=16373 res=1 16:35:24 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc0280200003001100050fe1000c040009101a020200", 0x33a) 16:35:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x703}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:24 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) bind(r4, &(0x7f0000000300)=@nfc={0x27, 0x0, 0x2, 0x7}, 0x80) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000007000007050000004007a2a30005000000", @ANYRES32=r3, @ANYRES32=r0], 0x38}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYRES64=r7, @ANYRES64=r0, @ANYRESOCT=r3], 0x70}}, 0x0) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000400)=[{{0x1, 0x0, 0x0, 0x1}, {0x2, 0x1, 0x0, 0x1}}], 0x8) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x30, 0x140a, 0x800, 0x70bd2d, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x5}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 16:35:24 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000510e1000c040009101a020200", 0x33a) 16:35:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x801}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 715.201184][ T8118] validate_nla: 9 callbacks suppressed [ 715.201193][ T8118] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 715.271746][ T8118] bond37 (uninitialized): Released all slaves [ 715.313549][ T8125] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 715.342037][ T8125] __nla_validate_parse: 14 callbacks suppressed [ 715.342045][ T8125] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 715.397480][ T8118] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 715.425136][ T8114] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:35:24 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x10000fbff) 16:35:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x802}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="80000000000000004e240f2b3ddb524e00006e65741f00000000000000000f0002006e657464657673696d30000008008b00092320ef", @ANYRES32=0x0, @ANYBLOB], 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r5, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_FLUSH(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r7, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x100, r7, 0x800, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x10000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x96}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x913}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffe}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xd2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa0ec}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x2c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x20008000}, 0x4004880) sendfile(r2, r1, 0x0, 0x100000000) 16:35:24 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000548e1000c040009101a020200", 0x33a) 16:35:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x1, 0x40, 0x0, "0000e0ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"}, 0x2e7) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @ipv4}}}, 0xd8) listen(r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000200)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd000000100001000c081000414900000004fcff", 0x58}], 0x1) 16:35:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x803}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 715.614922][ T8142] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 715.618955][ T27] audit: type=1804 audit(1594658124.652:1235): pid=8138 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/521/cgroup.controllers" dev="sda1" ino=16073 res=1 [ 715.641927][ T8142] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 715.715659][ T8138] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 16:35:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x900}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:24 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc0280200003001100054ce1000c040009101a020200", 0x33a) [ 715.755714][ T27] audit: type=1804 audit(1594658124.702:1236): pid=8144 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/478/cgroup.controllers" dev="sda1" ino=16377 res=1 [ 715.802971][ T8141] tipc: All keys are flushed! 16:35:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x901}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 715.913547][ T8190] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 715.932157][ T8190] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:25 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000560e1000c040009101a020200", 0x33a) 16:35:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x902}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 716.194987][ T8197] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 716.253394][ T8197] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:25 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1ffffefff) 16:35:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x903}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)={0x5, 0x2, 0x1, 0xe0, 0x4}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00'], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) 16:35:25 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000568e1000c040009101a020200", 0x33a) [ 716.511147][ T8209] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 716.548219][ T8209] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xa00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 716.574271][ T27] audit: type=1804 audit(1594658125.612:1237): pid=8207 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/479/cgroup.controllers" dev="sda1" ino=16376 res=1 16:35:25 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc0280200003001100056ce1000c040009101a020200", 0x33a) [ 716.722511][ T27] audit: type=1804 audit(1594658125.672:1238): pid=8210 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/522/cgroup.controllers" dev="sda1" ino=16381 res=1 16:35:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xa01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 716.807047][ T8220] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 716.840881][ T8220] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xa02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:26 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000574e1000c040009101a020200", 0x33a) 16:35:26 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="7000000010001f0700"/20, @ANYRES32=0x0, @ANYBLOB="1f00000000000000480012800b00010062726964676500003800028008001c00050000000500260001000000050019007e73000005002b0002000000050017"], 0x70}}, 0x0) r0 = socket(0xf, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492778, 0x0) r1 = socket$netlink(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$SIOCPNENABLEPIPE(r3, 0x89ed, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r3, 0x65, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) getsockname$packet(r4, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r5, @ANYBLOB="00000000e60000001c1712000c000100626f6e6400005404f446f99999541cc419ff0000020006000800010006"], 0x3c}}, 0x0) connect$nfc_raw(r3, &(0x7f0000000340)={0x27, 0x1, 0x0, 0x4}, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x23, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4004001}, 0x800) [ 717.048488][ T8229] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xa03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 717.099205][ T8229] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:26 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:26 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc0280200003001100057ae1000c040009101a020200", 0x33a) 16:35:26 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc0280200003001100056ce1000c040009101a020200", 0x33a) 16:35:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xb00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000500) r2 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000250000000e0001006e657464657673696d4000000f0002006e65746465768b00000000", @ANYRES32=0x0, @ANYBLOB], 0x3c}}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r5}}, 0x20}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r8}}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000000c80)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000c40)={&(0x7f00000009c0)={0x250, 0x0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x14}, 0x18004) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000004c977e2aa7aa0d947433f65fb2b"], 0x1}}, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000040)={'ipvlan1\x00', 0x8d}) sendfile(r9, r3, 0x0, 0x100000000) [ 717.376407][ T8241] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.3'. 16:35:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xb01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 717.441405][ T8243] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:26 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, 0x0) socket(0x18, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f0000000180), &(0x7f0000000280)=0x4) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_all\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) write$binfmt_script(r5, &(0x7f0000000140)=ANY=[@ANYRESDEC=r0, @ANYRES16=r0, @ANYRES16, @ANYRES32, @ANYRES16], 0x208e24b) close(r1) 16:35:26 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e10007040009101a020200", 0x33a) 16:35:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xb02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 717.630222][ T8256] IPVS: ftp: loaded support on port[0] = 21 16:35:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = accept$nfc_llcp(r3, 0x0, &(0x7f0000003640)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="58000000020601000000000000000000000000000900020073797a320000000014000300686173683a69702c706f72742c6970000c000780080012409effffff050001000700000005090400000000000500050002000000"], 0x58}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003740)=[{&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000200)="0e87f179559db5e877322e1523e25b778858d76dcedd3f84b557a909e092fac7bce3b63f5a10ecea1bc6769a2ad4b9bac077b9f79df0161e600204b5b6a8aed075c22abacc3167302c649700c6f4d2c40c5bacbc97c1a937581009b294b96df08962df724155ef46d08c38fa6fa42a56ba1fbf11f385c257bad6a3d231c4e4d063d19b", 0x83}, {&(0x7f00000002c0)="4504adc782d5076bf3761d2a473a0eccdfd8db1181e03254e9470fe39a2549b977d4701d313de024a885ac57ba4cd638cfc467c1f33126490f6e9ebabc3222b3ab42664a4b99bc3138e5cbff518e3741cfb612a4f35afde34704c33e25e37af266ffef1b97b254cc7994e510a198c658eff4e9a08e96abb9172ba540a8ff0d8ccf2c4dcb0488497f9624a92d44fcc9917d999a71fd3b70b78b75327094e1de9f", 0xa0}, {&(0x7f0000000380)="5877a8219c478362bdd4317ab2d7ea9a0c13a7c49215e1a8c2e6e76618ce2eb1d2598373f4cdc0cdd4a7aa61c9735938597013edb5e0920dbafbf205e7e5989dd844017861cf68eab36e19fd212fc538048789d4f406ec0ab8068184f77f7c770b95e7fd43ccef061e75c98574176ce463219f0bae43358ad1c22c2ea5ce2406a60d60b514a85409a9", 0x89}, {&(0x7f0000000440)="f85a5a5f70e7f677117dfe0d5f792cac49262d76a79633ac73c616eb0acc4e9a6c77e7fea0a7560251643117aa403545375258717e27cb954b47cef5430cdf7e0c23258b1ec92381bba80b54b2c1b5421f4cb06bee6fe561f6394b04678f198e621ab539c9c00e4ae624e2e2bbb4386d4e153c762c4e78f5bb99edd2f23345f8195a6ff4348f7197d8d82a28c411be", 0x8f}, {&(0x7f0000000500)="6908399686c0def1dd524dee1116a0fbf1e4196722023877dc47bf4efc4717b1ea8b666e94f6492c69ebe527cad0446c9af047e2249472298b4ca0f3c82ae90c4a8bae9fb25e8eaec764c3afa3729a16e07e7cc14b90ac1342b231d942faeca443d07b64e894dd725090368d5aedd8dc26351059a119220431b6e91c9c857e3f2be7986a569aa167381ecd716cb26ea1e1031a79c8f890432ae88756e1eee07124ae8075aec2f5c7815b5ee54e0224102d69f25f591f7e9357b28f695699f5e19443bc5caa472a4154620fff97ee11e3b3715e20962f7164d805c19ab2cd3aa4800085637d4082cbefe1344aec7a3c05", 0xf0}], 0x5, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r2, 0xffffffffffffffff, r2]}}, @cred={{0x1c}}], 0xb8, 0x4044000}, {&(0x7f0000000980)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000fc0)=[{&(0x7f0000000a00)="e1538a20f0589baad52015a866b726f27772031a9849a77ff923504dee65363522b6834295566615bb11ab708dca348cbbba491022279cc8bdb1e0ef5a8e093ec552a97d83ec3edf744eadc0ad2c5f42aaee5d", 0x53}, {&(0x7f0000000a80)="758908ddbc072ced5df216dac49c884b18616414be89bf3c2a386780ecdef0a707612aa24c181ca9633a9499dd4edc3676bcec7c34d655f59a0b93948447837a3500b7c3e428fce72c71ad962c5c162b80da513ceb1a98bb954da818c3d3fec15b313b62279b62f80d0ab6", 0x6b}, {&(0x7f0000000b00)="20ef06e8257b44553d1cbb2f2359b9ebe9e7788661d52f0986038df74e0c77705de6affefe67851e3cc233e9548233b4f3ce6896a6debb70102c7f3d119a6974608ed39d0904b871e1a63c3f42cdf38eae9fda1b6e5934ef8ced60720ba2edfe870999b4acd4b30c8c9a78cd85193ed46e31988adf614a214a2a11613ee4dd1b1dca634972ab5019fed6188eb953339f067d9f7fcf78cefb5333351944f82175c605295f3c901cd3de94de4cb5b9d71273b7c032e9f4ee9b769a6b82f2c6d98909e315fe532a9ce8257fbd9d50dc12801145e99d1509c39083c19b1bbeb85f749a5b5638852aba75ce", 0xe9}, {&(0x7f0000000c00)="7919a947604463b6a2", 0x9}, {&(0x7f0000000c40)="575c1fd93300ecd43f10e245a3abcb43a7860798d8d21f836f73302b3ed8cd8baebaff9b5a3753c657b0ed81a9f6856d108d563955ac8fa0d8bd6a89c59ea063c3526fd945d6c9902aa12f8ebc55c51155b8", 0x52}, {&(0x7f0000000cc0)="a9c9ae58bf67770a9350ad961900d18fd6458b5719a3cce4cb90f92b91296048d32e0d17e90a7093c49944772bac9537e5471d55544ed218f15b4669d1c4473c9b8300cb7d99ad53e273d1066d29fae2447424f8a12875a0e52134b37925ad8c4813b9bf6e8422828ddd0b3914ca010339fb6c69dacc7b4395657c66aa27273c3cd6fbb0a6abd2b03319f7762fbe82f0f959966c50255debc3ca70bce30345091c48dae010e55e154131e6622ccaa3e33eb5319378a6c7ca60fb838e829586591fdfdc7c46720de7f0c3e7ec0bc19c31b520fcb9e52f1da773af228048c69230de7fd7418cb0a4448d1f82543dfe03cf", 0xf0}, {&(0x7f0000000dc0)="cc5897bbc5b0b8381e599f17f108a9c75286d36bf1e4f0280a63c32716ab93ea9e5ea78df34ee98eca5248232b49c22e73cfa004a213d517fcb888786cbf448bf4c6e708d819e3d606ab1401186b9a3aecbdebf4b0d3616c73e80fd6e1a510e38e9e1aa3b20c53547742ad6cc7d5d222c4d3bd96ced5d5ad2113ec314f79469bc3592331f7359a69a6b1e24f1b410d6a9d0264abdd8eb6afa6770c650b1958f4c613f01e7d", 0xa5}, {&(0x7f0000000e80)="ce8ebd77d5249960130bd0f5d6babe1da4f2fd483d2b92", 0x17}, {&(0x7f0000000ec0)="6f22ee3214107b4178", 0x9}, {&(0x7f0000000f00)="5129e853aa90bbb8fc711efa05884d32a9e8bf9145c53784d8e867a9a9117843353141a38344276b0332e31b64844a90531a3397c435ceff02ee59e146781c78c969ea2f0e3a2d890310953e32d218dedde9d735cb7716bc2798af12fb9bfa362e025dcf8ae665c0da9748c9eea25b7e1019de605149fb2780e5a552f1dd24fb601c495e50ada6787ca62875845ad7e1fbc5dc1b4ca74976e5b725e5e2ff80ab5469a2f516243702b9ea6e78143d430c612a3c679fa1625ece003f", 0xbb}], 0xa, &(0x7f0000001200)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x34, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, r1, r0]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb0, 0x8000}, {&(0x7f00000012c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001340)="32231ec60b2cd8ef4db7cfea84dcd54d49ddbd34051ca0a8aa898aa1e40a1e07ca4a815f", 0x24}, {&(0x7f0000001380)="04e672a573cdbe3463e829b00d01c78e25c8dfde5f51b65345e70c09", 0x1c}, {&(0x7f00000013c0)="b9e09a1a110d939e312a7a618637c737dca7a8ec02177772e21d0af31137fea77ae6c4f0551117d4ce4322a37516673c113a6760647c884a17216dcaad37a431a2998fb565e5752b0c0c858622ab3e3e0b49a87da21bdbe6a1ec88a164bbc013132424e44a5d6c2ac471", 0x6a}], 0x3, 0x0, 0x0, 0x804}, {&(0x7f0000001480)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001780)=[{0xfffffffffffffffd}, {&(0x7f0000001500)="585d60b12bee68f7783e3d2a53c5b5a8c8d9451e7c51c1dfa4f632e341ae39daa05793551e8522626105d47308a561a1ed9dcbd431b9e71f34b3ad87d76ee0a05f3393cf822ec21c9e6a152dfe3ce9e9e70ade540c74acdf1ad13c43d457dd65d27f6ccfd539e856c7541ce392e16ab29abc1ca28c19174bfbd7032cebfe31be3a034cf28582913c856f07768b06ed7c16ed87f560edab9f9044173db82e4f5cd3850508c6b84a0d4938c98f66de52f9d2300e5caaa68920447c9173b102be6833d92bd3daa9952d1393c32963f0d1442ae490c525c2ada9c7780e71a75cdeb880701c0d3746640560fc79321150badca237d146df96c707b10b", 0xfa}, {&(0x7f0000001600)}, {&(0x7f0000001640)}, {&(0x7f0000001680)="e02bcb1f9bafaaecc06248aae809c07c400e4b87555788d473e04fcb7b6e538f8e4fdd9ce0958fb640a260ae69a2beb03e73ec969d41c493b7a82e7251a1761b8f7b780dfb1a18b1652c3d583ab80b402f036dee7523fd19a9e402a136d090c4f3f88ea96ac135e407dae80ef26ccab0fdc67dae55b055f48f3f92a22c5fca4cf3caaaecacb5c5eb6943a584063ef85c4228aab4b55a4c7b334e7b54a44c007264caae37885cc54a34dd60d9d9e674690f26ce83958fa8739cac6bc5c49f46fdcc900e8eb2d1517e5802d6ca9e47922ae2261f90a236581a2de2448aec5638782ff64f3d0e2ffe3f454e4e", 0xeb}], 0x5, 0x0, 0x0, 0x4040044}, {&(0x7f0000001800)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000001880)="dff69ccc9b7d4e36f84d38e949e64f1e62fcd85f4def36a84c1ad10d7702c6127f2af8491e8a2f75303b663d455050c953c78493b3002adb03e4c98aaba4314e98a765a88d996990484a62c071b9192800ab37b19718bc6b1d6c6566b360286d6e9aaa6a0f16ae4145ba6e4e61f41825b613c2af49ff20cf82e9df0f5a84c9fd34a1348fca2a9e7eacb1c92160624cc3d72345e33ad1c7df70eac75320707a797038643baf2a557ed8768d515999081f8cbac6ab5853443f490f254ae9ac8c057e171d", 0xc3}, {&(0x7f0000001980)="e88ae6a85a898ad57e6957349505a19385b064b85c16113ecfa534cfc0a0d9dd2dd91ca2efcd53473cf8749dabd850c0a0ae473b629a91e02860fffff1e7db4110f94d9e43fee70d3b25c69d5fd0a6c75028df8e7a4b7d0c0fb20e34410344deb45b6bf9c3988585746e6f5ee279b93b9766bb9541c73abf83611a0ea427cb85460972caec7a963272ed8304de656e787a945b67e6116b5d797c71aa9341711458cbb7a4c1bcef88d408bd3a1518bd9ea4fe1ee19b04dd1734bb85", 0xbb}, {&(0x7f0000001a40)="6dfa3e93bb198721d4ee3c712ba7f2d506e5ba19f6baace43a12c779002f5dfdee7a00cb4c5f5fea503a195f7b126e35cc741e4d0d82e14e863ea0e3079bac327609500bbcf764d59fdd3bcb9820447c29cdaeb335d2550f4e763ec10fdb3ad4fdfed6ad5a", 0x65}, {&(0x7f0000001ac0)="638d711d2088740da14c42f787532a4b929d7c19584d76914db9d0c67dcad0f242057dd4ccc4c4902ed90da108db51155065663efc903ba663d1aa77486f30b1a4973af1f79921973bbd0dababa808f397c5cbc2bc74299d11a1ca88bc0cee585f34e030592fbad7db1a2b5b2c2c3568420af651e420d07ae2bcae72e194512ff8ba7cdc784a0ae131a8bca4e589b239bfb59a5332b68334a2ec13d539851fe0552ee187820af9306598d5417884a432c6063cd419904f", 0xb7}, {&(0x7f0000001b80)="760264597a1e9d533bc82438e0f515abe61e38b1c6134a79a788f9267c7e4b7bb564077bd042429f6357f7ca4af63296d8d3f49c07bf5a68da706ccdb00ea7c84b5a64fff4b6719b3915e554bf75a6c5dd4797216c8e27de06e15585c32338f6ca1b6e14a584e49bbc08d31ef9cfe5", 0x6f}, {&(0x7f0000001c00)="d6a215ba9ece0bfbebe924454c1664f34a6365dbeacecfbd72", 0x19}, {&(0x7f0000001c40)="3ae8810e30a48642ef733d6ec1b739fb756996294d9a765b3bd3bd3f5f684d795eb15012c31fa67f388795e02f4b179618ec1479fa702a1c767d2fbcef43f0774233e58e005cdfce3c076d8a10b94d4fbfe504279ea92138be33240ab2152f3d6f3a53cf6a7a4c5aa0d890fb962731c4b5aca2480c65ff3b6538f3c0d8f8f6bef8e904d2694b6be57b16d0ac72b87952096d769ec3f96eb59b1f8165c20f3e3a1cf079d446a27fae5a775ae9bc742fb8f0712a94ed7bbddbad96da06175fa2b7f461e2421511e32ec8391439454352aef0a6912aa6f70bbcc9413d82f3", 0xdd}, {&(0x7f0000001d40)="975743d79d50632bc2857ec4a480516fd9369cb5113b77b498d99aa41c30664e13fac99ac69f72b4512890de99ad6793db1195db279e5be9cf61915ef635c5db47b7611d7d78e509f9b7ec168cd6fa9a322f78cddc9411e985b55b61a5f3dc456f258d1d544b857b82dcbb2c4d2bea5348ecab2dfe300e846676f964233251890ccd91b0d0a69db9fd89f5e17fdbb340", 0x90}, {&(0x7f0000001e00)="0fdb58d2ab8f8008e92b50fe0cdfe108cf7441ce41455c8ad7e0a972d97aa65ce667ba7a63a0f8f349f77d99abfbc6125c2775322d6b3673b41b4643e12630c5b35a6683d5dc3bffddf3b5a49551c6b3a31992ad84e1e96bf39767de11276b63469c902f81820301387225386759d7c5c9db6d0b563571ca36a87042070b4dbb4a536e93a6ca26dc768eef778406b209905118fad21d73490671cc3e0d175f552e99bb55e34f8b3e763358220d58b9592dfc932d83c7d542e7e4ba58fed111d2cf3222", 0xc3}], 0x9, 0x0, 0x0, 0x4810}, {&(0x7f0000001fc0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000002200)=[{&(0x7f0000002040)="80ba276f4a529a2dbfe308243cc9fbdbd28472fdf7a4e5ba1c5d2dc6f2a2f6df4a4701d88cbac85549cc5412f22f4b872e82d80b332461373542e616f8f35a033f9e5e44bf7518791bd121b50d5f355d424789b66b0d82030344cc5990ffeeb00649aef1618f4125ca4b83b31c7a00302ea6c023ad6c379504247a5a42f40ebf0819cd13bcd5aa44eb8e25d7fb2b3dcd910776ab9852b074f1eb7842d5d07588c34a22a675b7d68c46e7aa5ff7852102edd31ced1d250f99eabda868f63046f70b0ff4a869f77a60661483326ef9a16a3f7de91e1d64c4", 0xd7}, {&(0x7f0000002140)="0612b4eae300250750f7c5055836aba04bf05515e9701f964ebe4f237a654186f57f15c8e05a89e7a6e7885135cd78b1194b22256ee077f36e7998db3133da2677e436d2a4237a2e6e425f8803dcefe139747e53c074573050fb9079d0552c436787416afd281b3f6b5dc18e86062b1188563c8611af4ec41ae1217aa166a4052569a1b88d", 0x85}], 0x2, 0x0, 0x0, 0x4000800}, {&(0x7f0000002240)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000024c0)=[{&(0x7f00000022c0)="ecdf89dc8901524fa4b55662e50331593b4bc38201d65a126f47ad8aee5e679f7e5812a5880c6a16a38b9ca8f18a967308e72c9cfef6778edce86cf2d389c9d190bd387c6870a8f9291d03034e8e53f92ea9d46089b993d691d4eb11c74426ab9dd240", 0x63}, {&(0x7f0000002340)}, {&(0x7f0000002380)="1e9d36a9f2ed60e979b3bf6d305e86688f3c01a7eea7563d10603cdeb23c18e52c99", 0x22}, {&(0x7f00000023c0)="0bfc321f58327384bac35bd158a699b6be30aa7854089bccd7be04d751648cfd33d09d8fffa1b6a8b23617a270e89648df0a865122f39653faf5b1513a05dbd22292b28bb86d1a6bee23ee72d6d2d06339e42a565d926976346433bba8604aad2961339c945fb7014ec394131f8d04631bc07c1d01fa06587c8f6643adba8c548f7e933866b85e610c857405ed8ba5cc192a4d964e02215f1a1a8788c1c85c0f1374ffb3b555ec11c3d623268e9fecbee32773f79832e6ac", 0xb8}, {&(0x7f0000002480)="1e0d363d573ce54b90ee66222893556661b20728c8e896ed3d68dc7956cc", 0x1e}], 0x5, &(0x7f0000002880)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, r1]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [r0, r0, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x160, 0x4}, {&(0x7f0000002a00)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000002b80)=[{&(0x7f0000002a80)="d2b1f8b677f8df99783badb819bd03b747f8756d349fbb5d0dcb422cb58f92dfea3b767f40a2e65d9307dae81d2fb4c379172f8ba71dc0c249cd171bbb071c4b4c92710d1865d932abfc3668843863697406c8f3", 0x54}, {&(0x7f0000002b00)="68e4b668a7ac85ec5c21c56e94d0b9a77a0bf73f2aacb7b954c97e65d1d5f0f27a02d6db3588f4f5253202c5cb3a", 0x2e}, {&(0x7f0000002b40)="38e03a7a56cd58e0ed93478c7ac9be12ecbbe3e01f06b896bf3efd8f69d53e5820e36e83bcffdfab354a86769171c2ef81171c61e61a", 0x36}], 0x3, &(0x7f0000002c40)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8, 0x20000881}, {&(0x7f0000002d00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003180)=[{&(0x7f0000002d80)="6d471c655e12b3b4421640d3cc0998327c8ce63bf7cdf5afac1a26839a640a03e8d391bafbe8aa313004cb697c7b59c677b762f648a1a53cc8599d7221f588fa4f", 0x41}, {&(0x7f0000002e00)="db80fcd2ed9b3d3deed74959a9566353d551b92b23c0ff09896b7d8f943b8c1011c76aa2e5bc17fde4ca7092d08be3a23b1b3613c193950bf32110561e465412", 0x40}, {&(0x7f0000002e40)="66ed940b1ecee375d7fe687682547b536d330c004a2bb910d84ec7fad6fbe48f6797ecb87d3804f1c380b48d36379f2a656f755c5f07f40b5a9d229b9fb4807cb8c8fba1be25d3245d3c12f42e4e48763f48d4df5a079a70f7a7b22c790221cd2b00047d76bc18fef6631d35c0f8db947d3aba0a1031352c6442686c28e33e775823051e5d666654f72dad691c907cd017259293cc21720def223872a0bf6144fd7747975f2ddddf4fd78badf1666560064f685c83d181f4a966c1145d860f97b4c7db4382a648df178a59c307283a6c9eaa7ba364c8b8d84dab4719f240a3e9e8e5d7f7b9bff220ca111a68ca6c6a56a320577d", 0xf4}, {&(0x7f0000002f40)="d35a461896cc707b9ca4101e860681a998aedd645496e59f6fa01bc1ec8f1bc089c209f1d94281c0e697de58c5096c7355c0b880c66b1129e7b9c4d2f4b4f394767893c040cd23610028bb6dfbe4247886bf16b1dc", 0x55}, {&(0x7f0000002fc0)="28437304761b097584555aa51e033f28b5beabe13144ec3557b4cc3d569fe0f7e0b4df06f92c40ebd707792e03b6cb46bdc0f72c9f512c4a6864bc2c968c39c32157d7d076df70c977bb63d80c3a552e644ccbd35da8138f717730848bbd62720344f3de5e9846450da13d34220b50c666068ea383fc2b60d04204efbbde2388d5149ba3fcd1fd0d894d5ea7bf2219dcefaeb4ea4f706d61eb54da928211c0365395020c5a911dc9f5089da2d564b2179b87a8ebc1fa630f1c4b12a80edf6d15b8", 0xc1}, {&(0x7f00000030c0)="91a8fb09a3e84f67a42f17e2725c3b59ffda67641a32186d45af943bec0957dd614f74e903e9fc4491d7327ccccd75dbcfd97e6326460377637be95a75c1bb5178ee0634cfa5066bc4ef66192816d77f2244fe7f4d83bdd028737e9295e8cbab2b5dfdfc0da57bc71451846f5e77a19884313031af57bc07653a56f6ac2d35548ca64537a5068758cc4a0cb67be953798e9bb29527b4ce58075b83cb6ead20ab2d6543848618295cfe8edf2f9e04", 0xae}], 0x6, &(0x7f00000033c0)=[@cred={{0x1c}}], 0x20, 0x1}, {&(0x7f0000003400), 0x6e, &(0x7f0000003540)=[{&(0x7f0000003480)="9ce1", 0x2}, {&(0x7f00000034c0)="4e3e188e4ecd5e12cd89f5b18d27e9c7d0659a16d492cb6c3262cb97725e892f22269d2ee7098848d293fe79f23915644030722856c10815c41ba9d8c940984e4124bd48", 0x44}], 0x2, &(0x7f0000003680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r4, r2, r1, r5, r2, r0, r2]}}, @rights={{0x24, 0x1, 0x1, [r0, r6, r7, r0, r8]}}], 0x90, 0x40000d8}], 0xa, 0x24004041) sendfile(r2, r1, 0x0, 0x100002000) 16:35:26 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000a040009101a020200", 0x33a) 16:35:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xb03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 717.712457][ T8256] lo speed is unknown, defaulting to 1000 [ 717.752575][ T8256] lo speed is unknown, defaulting to 1000 [ 717.874876][ T27] audit: type=1804 audit(1594658126.912:1239): pid=8265 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/480/cgroup.controllers" dev="sda1" ino=16374 res=1 16:35:27 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="912cf574", @ANYRES16=0x0, @ANYBLOB="00010000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0006000000"], 0x3c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x2000c110}, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040), &(0x7f00000000c0)=0x10) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="41000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r5}}, 0x20}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="2007000000000d040000000000000000100000000340e61217caa5e8bdbf1232b0bbcca2c7c61af9d965833d62af212222d6791e2f41c3ed22c3a1981e21fbde02e7efd8af3f58234bbe68f21c040393d289c0be4c9765783e1d8816d0e11e5e4f4e0b1b6edd4a3ee0edf9835f1b36f30cce3aa68832f645de6fefbbadfd52783807bc482eeb843edcc8888389615803934111974b0e16f1eab4a6aad908d6b654fb57d69de2fac14d98a539bf97abfe7f7e27722b1173f869b039c05a6a10c07b8ea902bcd41773571c6af1dd563f05f64d5300a3363e05e66bfd63db18f9556ddeb73929988c2e", @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000600)={'ip6tnl0\x00', &(0x7f0000000580)={'ip6_vti0\x00', r8, 0x4, 0x7, 0x8a, 0x2, 0x2, @mcast2, @mcast1, 0x7, 0x80, 0x9, 0x5}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000980)={0x170, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x94, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x40040}, 0x4004001) 16:35:27 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1020c040009101a020200", 0x33a) 16:35:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xc00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000004c0)={&(0x7f0000000200)="e1a9583e201b5ce694b99406a3896bae5478de14e553f3630664f95e4f3de35b4494d35f812f00d9650c754bfc4721f4deb0252626612981e570c820ed80b1404063b90df8672930cdd81a17e2d706464d37457154544040d24095c41677033717aeeb30dfcb841c229591e80f54e3d5cd2ff1b423c709600ecfb9c88d474a008b7b3477951fbb6747ca457a22cabc9307586f296a0ac90e6a0d5477754029901f1ea5040d73f36cfd9523cc941e053630e90d6214e460a0ea1e8d9a81a2c9382033a3b1efdc0e2eec4f4c426d4d599132c7c61fdff379dd6b5e5827a9282c410eb5e49ab1f5cdabd7", &(0x7f0000000140)=""/71, &(0x7f0000000300)="fff96ac82c3c1f8deac6840c333125129175b070ec57ce2c29288c15ae488506e0e79a819a7c3975e4c2eb77fbed2bb1a56c1beaa9a3ecfb05040485cab083c96614eb45cdc046a36f3f028106de326a0257b9e03de2da4a60acc1079dc4d8fb5ddacd0ec7a5b41b4e8bf5773caa3043fef22d7c16042bba75965e141e88ea6b01ee217d4be7acd92125881f8aee73ade57949b9ec607b9eff08225db4548cc633a8504e24854db8ca9304a8f08f5698a6bc88d7ae004fa937c8", &(0x7f00000003c0)="6063dd4d11c89a82aba6c42e81fcaf345d598c476e3c74271eabc02472d6e061b0a52329ff35ecd2cf40635e1131300cdc59f8e64a9877af8ac7a463a7386b45cb0c13ad97855bce700ca1e0c79c576bd99762e5a7ce19757985be8fcf9955be87fa947553e1c44e03d0917d81afcc266e728b027733f5443565b771e0491cda77514409f205cf5b0f7f3467b8927aa55482a8c9eb7ff70ae64ab0e17410ad88403b07bc397f90a8b49f88845b19ede17458c1dd06330b2fe2029aaf0820fc1ac515de9877d042626af88ec1da90bd645c6b45b095c280fe7ae886", 0x69b, 0xffffffffffffffff, 0x4}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) sendfile(r2, r1, 0x0, 0x100002000) 16:35:27 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1030c040009101a020200", 0x33a) [ 718.411559][ T27] audit: type=1804 audit(1594658127.452:1240): pid=8309 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/524/cgroup.controllers" dev="sda1" ino=16382 res=1 [ 718.453438][ T8259] IPVS: ftp: loaded support on port[0] = 21 [ 718.528638][ T27] audit: type=1804 audit(1594658127.572:1241): pid=8314 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/481/cgroup.controllers" dev="sda1" ino=16366 res=1 [ 718.578195][ T996] tipc: TX() has been purged, node left! [ 718.609062][ T8259] lo speed is unknown, defaulting to 1000 [ 718.664138][ T8259] lo speed is unknown, defaulting to 1000 16:35:28 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1040c040009101a020200", 0x33a) 16:35:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xc01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendfile(r2, r3, 0x0, 0x9) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100002000) 16:35:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="59ab3d330d321d70944178a04c6aaf5337fb0f35aa40efcb0a48155eb727a91ea998ba9bb28e81bde999e4ca10e27d56d1a7ce870e3a828bca19a0d3b720c79c7db9facb8890ea78ad563ecdb720c35bbd5b25fdcc9ad28d6552aede21b65374c21ac70e57f7dd265a33f2a6d40fabee05b42cd7ce0d150e164c727925b4ea7891ba73b21149bc844ae1da2f2a13ab243cd6a1c5498d3d7c6b98c313f6535339eeb3a7cabe4129e87ee3447ae70f20a1f3d3ea3cfa0bd0cda9e916745d1e6cf48382f7f07a613efc9abcd3a95d2080f66eff892a2c487ad906681e0c9a"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) r3 = socket(0x10, 0x803, 0x0) r4 = socket$qrtr(0x2a, 0x2, 0x0) setsockopt(r4, 0x1, 0x0, &(0x7f0000000400)="4d6015f59d7f30ff36dbc4e9e116af100f86b0e9f231e1d36d0b8b09aa81ed003add393ba27cb41a99dcbb220dc01fc91d8e5cd4d8e208796a6325aff01bb25104c095cd204f866804e280f1fb183cafd69ad2b4043b63b2d53304f8a013e83f02e1d5264d525bdbf779144ad7ad657a0d860d2cd5bd8b1a8c7939054fe7e26f51a9a1b51081b11fe6c266a24be2a8367a11429c2f7eaeaa92bc2f880d9f68f9805e8043307949a774ced28f54d221e23d2757f050cfce1ca4194f86d21b4c984e044ef4a0fcd280bb6ccca2700a3afdae91", 0xd2) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4008090) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r5, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) 16:35:28 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, 0x0) socket(0x18, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f0000000180), &(0x7f0000000280)=0x4) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_all\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) write$binfmt_script(r5, &(0x7f0000000140)=ANY=[@ANYRESDEC=r0, @ANYRES16=r0, @ANYRES16, @ANYRES32, @ANYRES16], 0x208e24b) close(r1) 16:35:28 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xc02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:28 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1050c040009101a020200", 0x33a) [ 719.393286][ T8363] IPVS: ftp: loaded support on port[0] = 21 [ 719.418587][ T27] audit: type=1804 audit(1594658128.463:1242): pid=8361 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/482/cgroup.controllers" dev="sda1" ino=16375 res=1 [ 719.484063][ T8363] lo speed is unknown, defaulting to 1000 16:35:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xc03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 719.532346][ T27] audit: type=1804 audit(1594658128.513:1243): pid=8368 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/525/cgroup.controllers" dev="sda1" ino=16371 res=1 [ 719.544292][ T8363] lo speed is unknown, defaulting to 1000 16:35:28 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1060c040009101a020200", 0x33a) 16:35:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xd00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getpeername$l2tp(r3, &(0x7f0000000100), &(0x7f0000000140)=0x10) sendfile(r2, r1, 0x0, 0x100002000) 16:35:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28100000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) 16:35:28 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1070c040009101a020200", 0x33a) 16:35:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xd01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:29 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1080c040009101a020200", 0x33a) [ 720.040697][ T27] audit: type=1804 audit(1594658129.083:1244): pid=8407 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/483/cgroup.controllers" dev="sda1" ino=16382 res=1 [ 720.167913][ T27] audit: type=1804 audit(1594658129.133:1245): pid=8409 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/526/cgroup.controllers" dev="sda1" ino=16065 res=1 [ 720.243537][ T8418] validate_nla: 11 callbacks suppressed [ 720.243547][ T8418] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xd02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:29 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:29 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1090c040009101a020200", 0x33a) 16:35:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100), 0x4) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRESOCT=r2], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100002000) 16:35:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="912cf574", @ANYRES16=0x0, @ANYBLOB="00010000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0006000000"], 0x3c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x2000c110}, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040), &(0x7f00000000c0)=0x10) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="41000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r5}}, 0x20}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="2007000000000d040000000000000000100000000340e61217caa5e8bdbf1232b0bbcca2c7c61af9d965833d62af212222d6791e2f41c3ed22c3a1981e21fbde02e7efd8af3f58234bbe68f21c040393d289c0be4c9765783e1d8816d0e11e5e4f4e0b1b6edd4a3ee0edf9835f1b36f30cce3aa68832f645de6fefbbadfd52783807bc482eeb843edcc8888389615803934111974b0e16f1eab4a6aad908d6b654fb57d69de2fac14d98a539bf97abfe7f7e27722b1173f869b039c05a6a10c07b8ea902bcd41773571c6af1dd563f05f64d5300a3363e05e66bfd63db18f9556ddeb73929988c2e", @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000600)={'ip6tnl0\x00', &(0x7f0000000580)={'ip6_vti0\x00', r8, 0x4, 0x7, 0x8a, 0x2, 0x2, @mcast2, @mcast1, 0x7, 0x80, 0x9, 0x5}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000980)={0x170, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x94, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x40040}, 0x4004001) 16:35:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="28000000040601a8a007049a603d56835c22135bc038f710c681fcad7d8e4846bb19a701baf5729758d504c048bc5fb0528c66d6476ee83c55259f0314a12afa706bc5903f2af91e6fd58d850823f4360605a8c6b6c33742c9bd51bfa4c0ef6120f8d8105490cf8b79bad00eac22261d6433fd1d930730c48d21e41629e6d35b5154324deb050b5a486f4db152e2fda77162691f4ac604e6"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) [ 720.975098][ T8441] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xd03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 721.027260][ T8441] __nla_validate_parse: 12 callbacks suppressed [ 721.027269][ T8441] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 721.079122][ T27] audit: type=1804 audit(1594658130.123:1246): pid=8440 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/527/cgroup.controllers" dev="sda1" ino=15970 res=1 [ 721.167209][ T27] audit: type=1804 audit(1594658130.173:1247): pid=8447 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/484/cgroup.controllers" dev="sda1" ino=15986 res=1 16:35:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xe00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:30 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e10a0c040009101a020200", 0x33a) 16:35:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xe01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 721.372138][ T8458] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 721.409009][ T8458] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x4}]}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r5, 0x110, 0x5, &(0x7f0000000340)=[0x4, 0x4], 0x2) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r6, @ANYBLOB="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"], 0x3c}}, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r7, 0x100, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c085}, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYRESHEX=r2, @ANYRES16], 0x1}}, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @rand_addr=0x64010102}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r1, 0x0, 0x100002000) [ 721.467070][ T27] audit: type=1804 audit(1594658130.513:1248): pid=8452 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/480/cgroup.controllers" dev="sda1" ino=15777 res=1 [ 721.502439][ T8452] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:35:30 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e10c0c040009101a020200", 0x33a) [ 721.527733][ T8452] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. 16:35:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xe02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 721.671193][ T8468] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 721.696200][ T27] audit: type=1804 audit(1594658130.733:1249): pid=8464 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/485/cgroup.controllers" dev="sda1" ino=15826 res=1 [ 721.721435][ T8468] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:30 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xe03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 721.801463][ T8464] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 721.819057][ T27] audit: type=1804 audit(1594658130.803:1250): pid=8445 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/527/cgroup.controllers" dev="sda1" ino=15970 res=1 16:35:30 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e10e0c040009101a020200", 0x33a) [ 722.018767][ T8514] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 722.060264][ T8514] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="912cf574", @ANYRES16=0x0, @ANYBLOB="00010000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0006000000"], 0x3c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x2000c110}, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040), &(0x7f00000000c0)=0x10) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="41000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r5}}, 0x20}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="2007000000000d040000000000000000100000000340e61217caa5e8bdbf1232b0bbcca2c7c61af9d965833d62af212222d6791e2f41c3ed22c3a1981e21fbde02e7efd8af3f58234bbe68f21c040393d289c0be4c9765783e1d8816d0e11e5e4f4e0b1b6edd4a3ee0edf9835f1b36f30cce3aa68832f645de6fefbbadfd52783807bc482eeb843edcc8888389615803934111974b0e16f1eab4a6aad908d6b654fb57d69de2fac14d98a539bf97abfe7f7e27722b1173f869b039c05a6a10c07b8ea902bcd41773571c6af1dd563f05f64d5300a3363e05e66bfd63db18f9556ddeb73929988c2e", @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000600)={'ip6tnl0\x00', &(0x7f0000000580)={'ip6_vti0\x00', r8, 0x4, 0x7, 0x8a, 0x2, 0x2, @mcast2, @mcast1, 0x7, 0x80, 0x9, 0x5}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000980)={0x170, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x94, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x40040}, 0x4004001) 16:35:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r3, 0x4004743a, &(0x7f00000000c0)=0x3) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='pids.events\x00', 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000200)=0x6, &(0x7f0000000240)=0x4) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r1, 0x0, 0x100000000) 16:35:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xf00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:31 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e10f0c040009101a020200", 0x33a) 16:35:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xf01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="58000000020601000000000000000000000000000900020073797a320000000014000300686173683a69702c606f72742c6970000c000780080012409effffff05000100070000000500040000000000050005000200000040ee67a8cb229adee2c43c17397912e339ff312c9f22982ea7163c264a53df7a462e86a31edb7a8c241c1b9380f536885e8d32298e10fcd3b06ecfc2c5bed1c36a620b5b77a42d3b90bb70198254ca16d37386e993b0b733e1e7b5a80ec3c47250bb395636"], 0x58}}, 0x0) write(r1, &(0x7f0000000100)="067554b4a0e10a5bd406f630a058fcf25f020a63e2960a242924c05ed99d50cff77b1a53dd8695e47e21320324c7fc9db272351601fafdcf8ea939caecd9373fa0b723d27f70079ddef76eeb9bdc0c594b8e39475b9a4a08d8af1abe67c42b721ff986cbfa85d5fc44e766190abcc991c1e6f7ced815a9a29937295c20412a8b882c361c1a4628745b8011452169b3ae0bce54011aedeb6b5bb9", 0x9a) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002000) [ 722.291388][ T8526] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 722.347441][ T8526] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 722.357811][ T27] audit: type=1804 audit(1594658131.393:1251): pid=8525 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/528/cgroup.controllers" dev="sda1" ino=16114 res=1 16:35:31 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1100c040009101a020200", 0x33a) 16:35:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xf02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000500) r2 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100000500) ioctl$PPPIOCGNPMODE(r4, 0xc008744c, &(0x7f0000000300)={0xc223, 0x3}) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000580)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000250000000e00010200000064656d0000000000000f0002006e657443657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="81a102f3d4ff9153a96acfbf44bbac9c0438b992318d5cd9ff917d6d32edc44b0659cd0f3bc381bdbd99478f2f189564dac12581ec23847544a082dda6a823a0e4e8bcc0f5729f0051c302ff54feb1246a170643b814c0f90db3273bdd977ec9c4788d2b8f1fb82548c812d303fca177962a916b81e1afd6a4d1dab6db45813cbb19039d99db596cd0e2f3d5d740c0c4d12a58bcf0ba44a8"], 0x3c}}, 0x40) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000002f8101"], 0x1}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r3, 0x0, 0x100000000) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$AUDIT_USER_AVC(r7, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xb8}, 0x1, 0x0, 0x0, 0x81}, 0x4000) [ 722.581195][ T8529] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 722.604860][ T8529] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 722.615838][ T8546] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 722.641553][ T8546] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:31 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xc, 0x10010, r0, 0x61e64000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000040)=0x6, 0x4) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x70bd26, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) 16:35:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xf03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 723.015709][ T8554] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:35:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="58000000020601000000000000000000000000000900020073797a320000000014000300686173683a69702c606f72742c6970000c000780080012409effffff05000100070000000500040000000000050005000200000040ee67a8cb229adee2c43c17397912e339ff312c9f22982ea7163c264a53df7a462e86a31edb7a8c241c1b9380f536885e8d32298e10fcd3b06ecfc2c5bed1c36a620b5b77a42d3b90bb70198254ca16d37386e993b0b733e1e7b5a80ec3c47250bb395636"], 0x58}}, 0x0) write(r1, &(0x7f0000000100)="067554b4a0e10a5bd406f630a058fcf25f020a63e2960a242924c05ed99d50cff77b1a53dd8695e47e21320324c7fc9db272351601fafdcf8ea939caecd9373fa0b723d27f70079ddef76eeb9bdc0c594b8e39475b9a4a08d8af1abe67c42b721ff986cbfa85d5fc44e766190abcc991c1e6f7ced815a9a29937295c20412a8b882c361c1a4628745b8011452169b3ae0bce54011aedeb6b5bb9", 0x9a) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002000) 16:35:32 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1480c040009101a020200", 0x33a) 16:35:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1001}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYRESOCT=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x4c, r1, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x90}, 0x4000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100002000) [ 723.242012][ T8565] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1002}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:32 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e14c0c040009101a020200", 0x33a) 16:35:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1003}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:32 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1600c040009101a020200", 0x33a) 16:35:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1100}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:32 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffdc, 0x0) 16:35:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = accept4$x25(r2, 0x0, &(0x7f0000000200), 0x80800) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100002000) 16:35:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1101}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1cd80100, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {0x5, 0x0, 0x4}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x8}]}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x40840) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) 16:35:33 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1680c040009101a020200", 0x33a) 16:35:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/164, 0xa4}, {&(0x7f0000000040)=""/56, 0x38}], 0x2, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_FLUSH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0x2d4, r3, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xd4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x8, @local, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x8, @local}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x4, @private0={0xfc, 0x0, [], 0x1}, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x5, @mcast1, 0x2}}}}]}, @TIPC_NLA_NODE={0x19c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4a, 0x4, {'gcm(aes)\x00', 0x22, "a19a0fadece2b0d7e41735c639d4aa07d648cb43c635ed8ecefdd2e363474620c72f"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe1ab}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "45321462d30d1c56b0119e46e9632788a91d38fd4c18bf79cbdb02860be08fad9f"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x1d, 0x3, "34237284da8e16a111c5e0d20afedb2600debaee538648a01a"}, @TIPC_NLA_NODE_ID={0xb5, 0x3, "f48e7c9b6d5b5b3a0d432d941233483cd04bc235287ef5664986044792ee732943d6e29f7ae6d7afe3ce881a149357c64f0b82a746c774eaeb359b2a34cdd0f97d8070cbfcfbab89dc9461ebd395e128a54d251462b855545a6267b8ef5c869412f456f922cff1c9a99f6007b79a43ac66b512cc0192cfc978273a343003c01446fdfd79df8c5a69c8ce6b8eeb924b141a7431f1bd29872c50d317bcc7f56fe16b3a291faa04512c70b6adb1448c23b942"}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xd8}]}, @TIPC_NLA_BEARER={0x44, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffc}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x2, @mcast2, 0x4}}}}]}]}, 0x2d4}, 0x1, 0x0, 0x0, 0x40}, 0x20000080) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000000) 16:35:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1102}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1103}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:33 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e16c0c040009101a020200", 0x33a) [ 724.318451][ T8605] tipc: All keys are flushed! 16:35:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r3 = accept(r2, &(0x7f0000000100)=@ax25={{0x3, @netrom}, [@default, @netrom, @rose, @remote, @null, @null, @rose, @rose]}, &(0x7f0000000180)=0x80) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100002000) [ 724.375216][ T8616] device veth42 entered promiscuous mode 16:35:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1200}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 724.435191][ T8616] bond0: (slave macvlan5): Enslaving as an active interface with an up link 16:35:33 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1740c040009101a020200", 0x33a) [ 724.517393][ T27] kauditd_printk_skb: 10 callbacks suppressed [ 724.517406][ T27] audit: type=1804 audit(1594658133.563:1262): pid=8626 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/489/cgroup.controllers" dev="sda1" ino=16383 res=1 16:35:33 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffdc, 0x0) 16:35:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1201}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, 0x1c) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f00000000c0)=0x1, &(0x7f0000000100)=0x1) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x33, &(0x7f0000000180)=0xcf, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e2c, 0x0, @remote}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="58000000020601000000000000000000000000000900020073797a3200000000140003006861736869702c706f72742c6970000c000780080012409effffff05000100070000000500040000000000050005000200000058b25500303f0c54d23af9a31efdda9363f04d7657660ac5b4633cd191d5bf4029950bc8260979949f2c459d7139fb075a2a9703b17bd70c177a9b7345f2703569f100197fca3725210043bc1764bfbc727cffd44f47887c49b810f97966b93884b5c6ba05"], 0x58}}, 0x0) sendfile(r4, r0, 0x0, 0x8000000000004) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="06000000000000000a004e2300000009fe880000000000000000000000000101010001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bacfa6e8000000000000000000000000040000000a004e2300003206fe8000000000000000000000000000bbff010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2200000800ff02000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000092fe880000000000000000000000000101834000"/493], 0x290) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003480), 0x0, 0x0, 0x0) 16:35:33 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e17a0c040009101a020200", 0x33a) 16:35:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socketpair(0x33, 0x800, 0x3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$pptp(r2, &(0x7f00000000c0)={0x18, 0x2, {0x3, @multicast1}}, 0x1e) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000200)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x1, @broadcast}, 0x2, {0x2, 0x4e21, @loopback}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000000) [ 724.760544][ T996] tipc: TX() has been purged, node left! 16:35:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1202}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:33 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e10027040009101a020200", 0x33a) [ 724.946530][ T996] tipc: TX() has been purged, node left! [ 724.992178][ T27] audit: type=1804 audit(1594658134.033:1263): pid=8651 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/532/cgroup.controllers" dev="sda1" ino=16241 res=1 16:35:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1203}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:34 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e10044040009101a020200", 0x33a) [ 725.245321][ T27] audit: type=1804 audit(1594658134.283:1264): pid=8627 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/489/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 725.276137][ T8663] validate_nla: 11 callbacks suppressed [ 725.276146][ T8663] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="fa010412000903ff05000100070000000000"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) 16:35:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1300}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:34 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1005a040009101a020200", 0x33a) [ 725.493374][ T8672] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 725.588756][ T27] audit: type=1804 audit(1594658134.633:1265): pid=8673 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/490/cgroup.controllers" dev="sda1" ino=16379 res=1 16:35:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1301}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:34 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffdc, 0x0) 16:35:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f00000000c0)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) 16:35:34 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e10069040009101a020200", 0x33a) 16:35:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r3 = accept(r2, &(0x7f0000000100)=@ax25={{0x3, @netrom}, [@default, @netrom, @rose, @remote, @null, @null, @rose, @rose]}, &(0x7f0000000180)=0x80) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100002000) 16:35:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1302}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 725.753513][ T8682] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:34 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e103d0040009101a020200", 0x33a) [ 725.902348][ T27] audit: type=1804 audit(1594658134.943:1266): pid=8687 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/533/cgroup.controllers" dev="sda1" ino=15811 res=1 [ 725.938000][ T8695] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1303}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 725.956828][ T8687] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 16:35:35 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e10007040009101a020200", 0x33a) [ 726.055266][ T27] audit: type=1804 audit(1594658135.093:1267): pid=8684 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/485/cgroup.controllers" dev="sda1" ino=16382 res=1 16:35:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRESDEC=r2], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100002000) 16:35:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1400}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 726.186677][ T8702] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 726.239305][ T8702] __nla_validate_parse: 17 callbacks suppressed [ 726.239314][ T8702] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000040)=0x2, &(0x7f00000000c0)=0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) 16:35:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1401}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:35 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000a040009101a020200", 0x33a) [ 726.453327][ T27] audit: type=1804 audit(1594658135.493:1268): pid=8706 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/491/cgroup.controllers" dev="sda1" ino=15811 res=1 [ 726.538079][ T8716] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 726.544386][ T8712] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 726.547804][ T27] audit: type=1804 audit(1594658135.563:1269): pid=8714 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/534/cgroup.controllers" dev="sda1" ino=15777 res=1 16:35:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r0) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffdc, 0x0) [ 726.568250][ T8712] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:35:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1402}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 726.623218][ T8716] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:35 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffdc, 0x0) 16:35:35 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e10027040009101a020200", 0x33a) 16:35:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1403}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r0) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffdc, 0x0) 16:35:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000a2cf20269d0000000000ef0000ff00dfff080600"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) [ 726.875528][ T8726] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 726.894175][ T8726] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r0) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffdc, 0x0) 16:35:36 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e10044040009101a020200", 0x33a) [ 727.069670][ T8737] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendfile(r2, r1, 0x0, 0x100000000) 16:35:36 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r0) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffdc, 0x0) 16:35:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1500}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 727.118268][ T27] audit: type=1804 audit(1594658136.163:1270): pid=8736 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/492/cgroup.controllers" dev="sda1" ino=16381 res=1 [ 727.150880][ T8737] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1501}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:36 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1005a040009101a020200", 0x33a) [ 727.325612][ T27] audit: type=1804 audit(1594658136.363:1271): pid=8746 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/535/cgroup.controllers" dev="sda1" ino=16375 res=1 [ 727.360302][ T8746] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 727.453542][ T8753] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1502}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:36 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r0) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffdc, 0x0) 16:35:36 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e10069040009101a020200", 0x33a) 16:35:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000040)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000500) r4 = openat$cgroup_ro(r2, &(0x7f0000000180)='memory.swap.current\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x30, r6, 0x1, 0x0, 0x0, {{}, {}, {0xa, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r4, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r6, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x8, 0x2, 0x2}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x801}, 0x84) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="449123e2cbb8385ae5ab62eaf308"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r7, r1, 0x0, 0x100000000) [ 727.803104][ T8764] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1503}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYRESOCT=r2], 0x48}}, 0x8000) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r7, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r8, 0x401c5820, &(0x7f00000000c0)={0x20}) ioctl$FS_IOC_FIEMAP(r8, 0xc020660b, &(0x7f00000003c0)={0x0, 0x100000000, 0x1}) r9 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(r8, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x3c, r9, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004041}, 0x4008000) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r5, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="080028bd7000fddbdf250400000008170400ac1414aa08000500ac1e00011400000000000000000000000000000008000400ffffffff14000300"/78], 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x4000) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x148, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9, 0x1, 'hfsc\x00'}, {0x14, 0x2, @TCA_HFSC_RSC={0x10}}}]}, 0x44}}, 0x0) 16:35:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.events\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000500) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuset.effective_mems\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100002000) 16:35:36 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r0) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffdc, 0x0) 16:35:37 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c020009101a020200", 0x33a) [ 727.948099][ T8765] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 16:35:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1600}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 728.035056][ T8771] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 16:35:37 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:37 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c030009101a020200", 0x33a) 16:35:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f00000002c0)={0x1, 0x2, 0x1000, 0x9c, &(0x7f0000000100)="0fae97ff027bc8576baa238817b45a4c644288542a121cf2239c927fb956aa0ee710d18399109156b22c90c1a767baef2d824ad7cb742d247216a216fa71c5729a468a8dfe117014f494453284fc562c438af5ab108ce2b38aad3d77128a7c52e45e3cdf0963b722590f0d797e1b4680b18bfaa44a2ea2550558c204f1e2a5dbb1f7103d9524e1bcdd15d9eda35658ce2efdf6d46831b46264e019d7", 0x97, 0x0, &(0x7f0000000200)="ec8d73e79969390923213df99795ff1897573a8757ff7a14117812ecaed6a221e4de3449c502b586e7c2a71b5fd0982b65c214cac1d160f61558adb1d8f00c5a632e85e95143754c016af1814a46374c4099bd43f3a260a147f8c38eec01bc1a7e3947a573f7b8208107d5e15e162dba60507776ae8feafad991287f07b273ebac4a6818a46f7fc18565c92fd7f8c0860620e21497d62c"}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100002000) 16:35:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1601}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:37 executing program 3: unshare(0x40000000) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={r1}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400)={0x2, 0xeea, 0x0, 0x6, 0x8, 0x5, 0x7f, 0x7, r1}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400)={r1}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000380)={r1}, &(0x7f00000008c0)=0x8) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCDELRT(r2, 0x890b, &(0x7f0000000100)={@null=' \x00', 0x0, 'ip6gretap0\x00'}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000851}, 0x20000010) ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x4e26, @multicast1}, {0x2, 0x0, @dev}, {0x2, 0x0, @private=0xa010101}, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000240)='ip6gretap0\x00', 0x1, 0x0, 0xaeb7}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000200)=0x3, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f0000000000)="39f3cd9fb177d2a035e4c8bb5ba925d63fff49d35149e7ab45c71a53f1b5f781767c4f2d782f0839d971bf47266b59d1610e6b4705b22f3daa4137d43ac03264bc0289e8b6126222a8ff21fc5c40632736df924c7197ba6c841d21bbff6bb529e6d7533178edf584401ef3ebd3ac0e713c7efdc35e67f9d5211aad8725c6c6e3c4809cddca79b6ba", 0x88}, {&(0x7f0000000300)="3c78003d0f1d3acd1c34b3d6e835d7a3b9f2971824b767509daa3aa5dfad5a47927dfb2eb8a03dd67f39a6df812ecb1ebca758d5705b37ff2b13f0e2edcdfb3453c8d3e34d35937a3e1b05bc7ba2ee84045137e8a94b7d5934b4a4e05961505902da", 0x62}, {&(0x7f00000000c0)="a245dcb60f66e2a42c917863794abdaeae811506137d541d4f1a457295fcede8ecb0f84c4b40462ed2efd219264870839ce44b4091ac6a41984608dfe7b98c", 0x3f}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="ad1a70f15011d804041c8d84d02bdc96264acc7444ded1913c650984b9e1d261a18be76d08280d6e2f3a903c1bc174c457d1cea08fa8cfea84975b1412f36c588d2e4fc80f999c142c6a88f010ab507c8da1aaf162fa4d7d8554b22837faf808079f1624e5e0cf1548d973d3c54bde8281c613f82bc94d3ec4d14bb0bb3d974aa4a8332a60c10dc24e0a41dc52f34c2c108e8e68c85e49fafecea69671b65ec0a212e9995fd940ef9855ad7f30247e26885e5c2ec6568effed51e55be8f2ca6380ae39e5c3e6fd17b97850998f3c3e28e69aa677d9d7b409d5f7c6422a31b9a61d5dd8cb950759901c9401bfd5992b8f6be544", 0xf3}, {&(0x7f0000000500)="f78c659e44ce5566ced5b56c306bd3515ce672c8736c5e3e1da56fe45adf945c4d024fd4829bc1948a217b34b42eedf6c6e8f4c49efc515992493342c1cb36c383b694057a9085ef12bdac021696bbe29a84e2060ed8633f6c9c60c708c18757bf076efdcb975c57b002abca4bec2837350db0e910b4b220b00b6a2a481646e13d10796f10526512bc753ced4a301ae6c8b9f3eeb72204edb5843f29e8521e4c94bad1bf47bfda1652b325e5afa815508310c0e29327324e80d8775cd269fc9b52402ca872e74d4c5831fc709434d28049261712084d", 0xd6}, {&(0x7f0000000600)="04085f5c942d5563f84571198e6f0e76e40868c97296967f0ddf4653fe425644aa890a2ad400e9d02c736ac9953a13b5314ce78833c697282f750feac2288a1a72b50fce80c4d52b02aab26bb949144d83881411eb57f8d697bffd8304b1c8a808759983cf74608cc3d6dcb14ef49ea5d3906214b09e50e9cc2718a25fdcc581bf28ed9a5c9e9aca531054b3598ad93319b7d1b858d25f5bc424fb829c", 0x9d}, {&(0x7f00000006c0)="d74c783f90cafac87272ba6dca96848152965298503e53506c4a0aac2c13dad714470b8edad9e9d14d504f02c916704543b38ff1f8ebba61c0245aaf576b2b92df55d0d612a363ce0964730bca222b5687778d81b74acbb09a1aa07b38332bcfdaf81069c0fd20be0df763c2c48b43d142ad3c8abc553b18b103864e6c82bc3a867397d091d0df907ddc86ddc4b4a017e6bd72a48aae41d8688120eafabab83a3e90a9164e89549715805a6ad3b4f2ed9b21eff59166c2ede47afb4bfaf6873d341e2e8bebc30c02ac8f8640ad356b6fc5654e6419d6cdf0a857d79c87e8202d11b9d5a3a78796dc4f6a6be6f7c5", 0xee}, {&(0x7f00000007c0)="2c59596eaefb803d1b83c01298a87fa3fe11b04db52062aa98a69744314d596a0b01a62c8790e3bc3711b7bf2328ceb594571ece13c2", 0x36}], 0x9, 0x5) 16:35:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}]}, 0x3c}}, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)={0x8c, r2, 0x20, 0x70bd25, 0x25dfdbfd, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4004880}, 0x40010) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000300)=0x14) sendfile(r3, r1, 0x0, 0x100000000) 16:35:37 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c050009101a020200", 0x33a) [ 728.459265][ T8836] IPVS: ftp: loaded support on port[0] = 21 16:35:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1602}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 728.545120][ T8836] lo speed is unknown, defaulting to 1000 [ 728.604376][ T8836] lo speed is unknown, defaulting to 1000 16:35:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1603}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:37 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c060009101a020200", 0x33a) 16:35:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1700}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 728.852857][ T8836] IPVS: ftp: loaded support on port[0] = 21 16:35:37 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c070009101a020200", 0x33a) [ 728.949469][ T8836] lo speed is unknown, defaulting to 1000 [ 728.990451][ T8836] lo speed is unknown, defaulting to 1000 16:35:38 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1701}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:38 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c120009101a020200", 0x33a) 16:35:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, &(0x7f0000000200)=0x84) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="58000000020601000000000000000000000000000900020073797a320000000014000300686173683a69702c706f72742c694d000c000780080012409effffff050001000700000005004cb8a2e128b0046f8804000000000005000500026cb51dc23b0000008c427b45e74b32f768a9ec9acde7288fa5afe32e1f4aefa7d27f68a00595b9d6243f8e612c1412899bc5b4cc5497e0ba749882e95218111a6618b886070ba7070211f738e3b0fe1906ebe3ed87e44cccba202e2dd7a431cedf60946caf8b4106c87fe7b01b78e296832b4085a0bd93a7158e97"], 0x58}}, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRESOCT=r2], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100002000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@dev, @remote, 0x0}, &(0x7f0000000400)=0xc) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000004c0)={0x1d, r5, 0x1, {0x0, 0x0, 0x4}, 0xff}, 0x18, &(0x7f0000000600)={&(0x7f0000000500)="dc79e757420fd7505a1b4acdca9e9f9887796e3bf1ad9aaefcb42d043242396b5bf3d97fcbac2dff5227a5430ae3bfab1c970c0242c2bd00851e6e72596a80c7fd3368c0b6258b3d35cc159996c5b2db92450feba91c3bea3914d3c631ce0c4c01247888253531a25a74173268fdcb5ea1c09912f991792aeb8963153fdabfe91e03b3edbd75592209e4c86c5576e851532120b50d10a4c8a9157c17b7031945f978ebf554ba7474e7dc63a07252cade66cbf5e7e338038d08f4dcb69b5333916fda1f95d7eb45c6974a", 0xca}, 0x1, 0x0, 0x0, 0x1}, 0xc0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x54, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x54}}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000240)={r6}) 16:35:38 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c440009101a020200", 0x33a) 16:35:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1702}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}]}, 0x3c}}, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)={0x8c, r2, 0x20, 0x70bd25, 0x25dfdbfd, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4004880}, 0x40010) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000300)=0x14) sendfile(r3, r1, 0x0, 0x100000000) 16:35:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT=r2], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100000000) 16:35:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1703}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:38 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c5a0009101a020200", 0x33a) [ 729.573978][ T27] kauditd_printk_skb: 6 callbacks suppressed [ 729.573991][ T27] audit: type=1804 audit(1594658138.613:1278): pid=8921 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/538/cgroup.controllers" dev="sda1" ino=16384 res=1 16:35:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1800}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 729.759648][ T27] audit: type=1804 audit(1594658138.723:1279): pid=8928 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/489/cgroup.controllers" dev="sda1" ino=16365 res=1 16:35:38 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c690009101a020200", 0x33a) 16:35:39 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x54, r4, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @empty}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private2={0xfc, 0x2, [], 0x1}}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x4000000) sendfile(r2, r1, 0x0, 0x100002000) 16:35:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1801}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r0}}]}, 0x38}}, 0x4000000) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = accept$inet6(r2, &(0x7f00000007c0)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000840)=0x1c) connect$l2tp6(r3, &(0x7f0000000880)={0xa, 0x0, 0x0, @remote, 0x0, 0x1}, 0x20) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000000) r5 = socket(0x23, 0x3, 0x1ff) setsockopt$RDS_FREE_MR(r5, 0x114, 0x3, &(0x7f00000000c0)={{0xffffffff, 0x3}}, 0x10) [ 730.174880][ T27] audit: type=1804 audit(1594658139.213:1280): pid=8945 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/496/cgroup.controllers" dev="sda1" ino=15777 res=1 [ 730.313306][ T27] audit: type=1804 audit(1594658139.273:1281): pid=8950 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/539/cgroup.controllers" dev="sda1" ino=16376 res=1 [ 730.501116][ T27] audit: type=1800 audit(1594658139.273:1282): pid=8950 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16376 res=0 16:35:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r4 = accept(r3, &(0x7f0000000200), &(0x7f0000000040)=0x80) sendto$l2tp(r4, &(0x7f0000000840)="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", 0x1000, 0x44004811, 0x0, 0x0) 16:35:39 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c160209101a020200", 0x33a) 16:35:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1802}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:39 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r3, 0x89f5, &(0x7f0000001980)={'syztnl1\x00', &(0x7f0000001900)={'sit0\x00', r6, 0x4, 0x4d, 0x80, 0x6c7, 0x5e, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8000, 0x700, 0xffff8001, 0xc22}}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000019c0)=@ipv6_newaddr={0x7c, 0x14, 0x20, 0x70bd25, 0x25dfdbfe, {0xa, 0x58, 0xfa, 0x9a, r7}, [@IFA_ADDRESS={0x14, 0x1, @loopback}, @IFA_ADDRESS={0x14, 0x1, @remote}, @IFA_ADDRESS={0x14, 0x1, @private1}, @IFA_ADDRESS={0x14, 0x1, @ipv4={[], [], @multicast2}}, @IFA_CACHEINFO={0x14, 0x6, {0x9, 0x10001, 0x31f8ac56, 0x6}}]}, 0x7c}}, 0x0) 16:35:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)={0x24, r4, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_TXQ_QUANTUM={0x8}]}, 0x24}}, 0x0) getpeername(r1, &(0x7f0000000140)=@can={0x1d, 0x0}, &(0x7f0000000200)=0x80) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r4, 0x4, 0x70bd29, 0x25dfdbfa, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x800) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r1, 0x0, 0x100002000) 16:35:39 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c1e0309101a020200", 0x33a) [ 730.712146][ T27] audit: type=1804 audit(1594658139.283:1283): pid=8948 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/539/cgroup.controllers" dev="sda1" ino=16376 res=1 16:35:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1803}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 730.783566][ T8965] validate_nla: 8 callbacks suppressed [ 730.783575][ T8965] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 730.853934][ T27] audit: type=1804 audit(1594658139.813:1284): pid=8972 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/540/cgroup.controllers" dev="sda1" ino=16374 res=1 16:35:39 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c004409101a020200", 0x33a) 16:35:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1900}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:40 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, 0x0, 0x0) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) [ 731.015556][ T27] audit: type=1804 audit(1594658139.823:1285): pid=8970 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/497/cgroup.controllers" dev="sda1" ino=16373 res=1 16:35:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$NFT_MSG_GETRULE(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x203020e9}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x20, 0x7, 0xa, 0x3, 0x0, 0x0, {0xc, 0x0, 0x7}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x20040c0}, 0x40) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) 16:35:40 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c005a09101a020200", 0x33a) 16:35:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1901}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:40 executing program 3: unshare(0x40000000) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="0010000c0700000000ff03000000e7af338a000000", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="54000000020601000060a8d3302a99faea0000000700040040d35865e114e2a23d9de4b6ddbadeab82f881ef41f5350c06d8035ea57f62c8a4c14f00000014000300686173683a69702c706f7274ff"], 0x54}}, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000380)={0x1, 0x7, 0xa, 0x0, 0x0, [{{}, 0x2}, {{r0}, 0x6}, {{}, 0x1}, {{}, 0x10000}, {{}, 0xffff}, {{}, 0x7fff}, {{r3}, 0x6}, {{r5}, 0x3}, {{r1}, 0x7}, {{}, 0x400000000000}]}) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x30, r4, 0x1, 0x0, 0x0, {{}, {}, {0xa, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r4, 0x2, 0x70bd27, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x10001, @link='syz1\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x20040800}, 0x200400c0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r7 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r7, 0x0, 0x40, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000280)=0x54) [ 731.284807][ T8997] __nla_validate_parse: 17 callbacks suppressed [ 731.284816][ T8997] netlink: 798 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1902}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 731.335954][ T8998] IPVS: ftp: loaded support on port[0] = 21 [ 731.337514][ T9002] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 16:35:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="24000000070601040000000000ef0000000000001e000640000903ff05000100075d"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) [ 731.391823][ T27] audit: type=1804 audit(1594658140.433:1286): pid=9003 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/541/cgroup.controllers" dev="sda1" ino=16381 res=1 [ 731.418845][ T8998] lo speed is unknown, defaulting to 1000 [ 731.433064][ T8999] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 16:35:40 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c006909101a020200", 0x33a) [ 731.448243][ T9002] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 731.462984][ T8999] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 731.483299][ T8998] lo speed is unknown, defaulting to 1000 16:35:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1903}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 731.619540][ T27] audit: type=1804 audit(1594658140.663:1287): pid=9012 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/498/cgroup.controllers" dev="sda1" ino=16374 res=1 [ 731.677915][ T9021] netlink: 798 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1a00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:40 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040003101a020200", 0x33a) [ 731.918764][ T9041] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:41 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, 0x0, 0x0) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000300)=0x1c, 0x80000) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400)={0x2, 0xeea, 0x0, 0x6, 0x8, 0x5, 0x7f, 0x7, r2}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400)={r2}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r2, 0x10001}, &(0x7f00000000c0)=0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000000) 16:35:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1a01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 731.961314][ T9041] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x110, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x2a, &(0x7f0000000240)=""/2, &(0x7f00000002c0)=0x2) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f00000000c0)={0x20}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000003c0)={0x0, 0x100000000, 0x1}) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x3c, r3, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004041}, 0x4008000) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x14) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100002000) 16:35:41 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040005101a020200", 0x33a) [ 732.173619][ T9047] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 732.210179][ T9047] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 732.223581][ T8998] IPVS: ftp: loaded support on port[0] = 21 [ 732.250009][ T9058] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 732.283632][ T9059] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 732.284122][ T9058] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 732.312245][ T9059] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 732.377230][ T8998] lo speed is unknown, defaulting to 1000 [ 732.407045][ T8998] lo speed is unknown, defaulting to 1000 [ 732.496307][ T996] tipc: TX() has been purged, node left! [ 732.502469][ T996] tipc: TX() has been purged, node left! 16:35:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$xdp(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000380)="e3c591c63ad354306910ccd67838d2705cdabff5aa2b8217d07d2a75a7e1d681e7451c62b4630f4746dfa5b89b25b7b484ce0eae33fdff0f1c1d666c56e194bac28585d9ebe44207da965f8c46a18305104c077df0df4226b0e21bcf2e8243dd3a5114e7b0b8e6a7e2ac10c005822992166053eb19d842f3f981c0f823b7c2507f441153121e3e92325e99b16e8cb40bf0e63d50ad163f09e197e7cb630ae95e4ddc5e30903bdc76338e04fa73049730b1341df6298f50deca8cc54e5d12e503ad3b07d5cd0dbb97c5eb782615c3c9f40f19c8ffe6", 0xd5}, {&(0x7f0000000280)="66bf10b010cfe0b895de71e20c6ffa1aeab906b0c604e1fceee86e1e647cc7a0", 0x20}, {&(0x7f00000002c0)="94e66527b5bdd5462d8a25d0b572804fa3bddc4095f5f2f72122578ae9865f4087dc0baa29", 0x25}], 0x3, 0x0, 0x0, 0x20000041}, 0x11) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r3, @ANYBLOB="00000000e60000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r6}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x2, 0x8) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x20, 0x10, 0x2, 0x80000000, 0x0, {0x0, 0x0, 0x0, r10, 0x1284, 0x10089}}, 0x20}, 0x1, 0x0, 0x0, 0x40811}, 0x4c8a4) 16:35:41 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040006101a020200", 0x33a) 16:35:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1a02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000040)={'wg0\x00'}) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) 16:35:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1a03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 732.745222][ T9090] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 732.775311][ T9090] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:41 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04e006101a020200", 0x33a) [ 732.809073][ T9091] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 732.825182][ T9089] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 16:35:41 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, 0x0, 0x0) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1b00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 732.953150][ T9094] 8021q: adding VLAN 0 to HW filter on device bond38 16:35:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1b01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1b02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 733.026587][ T9094] bond0: (slave bond38): Enslaving as an active interface with an up link 16:35:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)=0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000200)={0x290, 0x3b, 0x100, 0x8000, 0x25dfdbfd, {0x1e}, [@generic="e117120619d225ec52b3647199c79778c67e1e64469f78be70504209c2fa", @nested={0x7a, 0x37, 0x0, 0x1, [@generic="a313a941ff5e788f21d01701c28d852c7339bae8f84f45db826ed27236aaeae120a66fd38621e3c84c942e534c875957b845cfbfc875c4a4bda3dec7354333eaf36a309f72a06caf2b3436faf4b5b5529e480f9a8862f267c44083f583bc4283e1bcbb4fd58526a82fe919055f01", @typed={0x8, 0x56, 0x0, 0x0, @ipv4=@multicast2}]}, @typed={0x8, 0x1d, 0x0, 0x0, @ipv4=@broadcast}, @generic="bf71cd21ea925319f17ef471d66af1c58a8609f8f3e1f78cf07a772573d0d55833d01391dd8281f726ea5b5bf35a71aa2aa3f042235060ae440a2305ca2c7ec4e0c327", @generic="17b19df8f34365eee7f192b5d19aaff208727c7f76bc04c6041c24369475f9e3a0db20cfafa2569ab0d59db8e012dac2c21705b5972c5a31b2529faf6f2df8eff62d720f4e2d91316525b074e3ff13904c1037099058d1c909b402017d8488309c873e9115", @typed={0x8, 0x33, 0x0, 0x0, @pid=r3}, @generic="1aaf16c0ad85ea963ed88977a85dbadeb1895667bbcee84181cadc96e214e3c93a8b7adec333befb4dfce89a457d637cbc74864829bfa2b4628c881feea7247a33d43dbe57dcfdf6e587a57ac7c2ac9d4dd8428edfb06ed8cf9d7a79a52e27c4708b80d6af5efdf6f67a21a9f7f2875e40132ae6e5a757378a1a6dcd595c58de29a1ea5fc72f902f3e319bc6da479d8eed02cdc3b1c496a72fb3b68367646a6f55d4524902cd1f001a61d8b9afe1f59991ce71bc03407b24079d238fa28d1754e28ce462eef238bc44", @typed={0x4, 0x60}, @nested={0x5a, 0x5c, 0x0, 0x1, [@generic="7163233e22637ebe1bbd19739a451c01f71aa6a2d8b4f01ed10567b3aa1badaf87852416166871ad515f3d23dcc3f0161e26", @typed={0x8, 0x49, 0x0, 0x0, @fd=r4}, @typed={0x8, 0x3, 0x0, 0x0, @u32=0x1}, @typed={0x14, 0x90, 0x0, 0x0, @ipv6=@remote}]}]}, 0x290}, 0x1, 0x0, 0x0, 0x8000}, 0x4d1) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r1, 0x0, 0x100002000) 16:35:42 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r1, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000200bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000370000216a0a00fe002000008500000027000000b7000000200000009500000000000000d10d633a8c36bbeb4000762373a7024f6d40c9b8c7da0ace992546daa595a6e42e09d24a3e8cbb7c84f39c355543248936e067e2043a9e60c287094edf3495a3d5ff55422c242ab67c1911f25ad1eec24cde2260a146967c385c3bf2e0e75a6e767509396c0a2280997125132380605f9840e41854f100002e88a30200000000000000104e4f4c693cc6d690c2e287cfb448a531fb0bfbae11b2f84050b2d35b6ad44a27e97df1a24e86b2d61db560e34ddf60b4861953c158d065c4cb0fe4a089e876e535188de88a16f36e4afe0f9ecc7dc90f330eb9ea0f9d4e808768000000000000006faf8f8751000000000064812c5012cfc357c0a3aa58daa0963a5b37f08765e5f9fd74ba75f8ce014f354ea0c9675a5c2e4fb4e41d7a4d5ffd3c2d884e66b274b55be7128f8744900cc760f9104cb569fa8b713716f94c1ed9aea40bdcd4f297ff1c9e47ea965d78ebc1111a50c9ab64e2031e9da510fda8e50ab8bb461803fedc511ddc0400000000000000edd94a7b664328135f271f424c21010f80891f48ca959ee2c87b87378995470284ab113a7d1ef4cce5aa1b2a1e9f0e6c91ef884453a111aa4d7edceb9f5e737f34268ed9a9f2b656d2f9e27305a68946e6444a1758b51e5fbe19a54f8ea6fbba07cd69cc365ebf276df6172fca4d0998e9eb62f533fe1cc14ee77726d3e8bbfac63d65c602fc4c051a03a60801859373facd168db890d5fec39e9063cba195f881f205395e7ed31ee497d063ff9920db269e90edba2975918e787e04da25a41300"/687], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/2104], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r2}, 0x78) r3 = socket$alg(0x26, 0x5, 0x0) r4 = accept$alg(r3, 0x0, 0x0) bind$alg(r3, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'tgr192\x00'}, 0x58) r5 = accept(r3, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000000d00)=[{0x0, 0x0, 0x0}], 0x1, 0x0) r6 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r6, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r6, &(0x7f0000000240)={0xa, 0x4e20}, 0x63) sendto$inet6(r6, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000140)='syz_tun\x00', 0x10) r7 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r7, 0x1, 0x4000000000000002, &(0x7f0000000280)=0x5, 0x4) bind$inet6(r7, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) setsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000040)={0x7, 0x7, 0x101, 0x40, 0x9, 0x9, 0x20}, 0xc) sendto$inet6(r7, 0x0, 0x0, 0x20040218, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 16:35:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1b03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:42 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040007101a020200", 0x33a) 16:35:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x4, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) [ 733.428843][ T9154] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1c00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:42 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040c07101a020200", 0x33a) 16:35:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1c01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:42 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200), 0x0) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:42 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040209101a020200", 0x33a) 16:35:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1c02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000180)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x458, 0x1, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_TUPLE={0xbc, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2e}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0xb}}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, [], 0x1}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'netbios-ns\x00'}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'tftp-20000\x00'}, @CTA_EXPECT_NAT={0x204, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0x26}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_EXPECT_NAT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @loopback}}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0xb4, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @private1={0xfc, 0x1, [], 0x1}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0x40}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @private=0xff}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_EXPECT_NAT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_EXPECT_NAT_TUPLE={0x44, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @remote}}}]}]}, @CTA_EXPECT_MASTER={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_NAT={0x120, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @multicast2}}, {0x14, 0x4, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_EXPECT_NAT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @loopback}}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x9c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @multicast1}}, {0x14, 0x4, @ipv4={[], [], @rand_addr=0x64010100}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x5}]}, 0x458}, 0x1, 0x0, 0x0, 0x80}, 0x8c0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) 16:35:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1c03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:43 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040309101a020200", 0x33a) 16:35:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r3, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRESHEX, @ANYRESOCT=r5], 0x1}}, 0x20040002) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r1, 0x0, 0x100000000) 16:35:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1d00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:43 executing program 3: r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.stat\x00', 0x275a, 0x0) bind$isdn_base(r0, &(0x7f0000000140)={0x22, 0x99, 0x1, 0xff, 0x9}, 0x6) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000240)={0x0, 0x6b8b, 0x400000000007ff00}) r3 = accept4$unix(r2, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6d328ef478c70a77, 0x0) accept4$unix(r3, &(0x7f0000000240)=@abs, &(0x7f0000000300)=0x6e, 0x80000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100000500) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x2c, &(0x7f00000002c0), 0x26d) setsockopt$sock_attach_bpf(r1, 0x1, 0x2c, &(0x7f00000002c0), 0x4) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='erspan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_SET_BSS(r2, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8b65ca042b66e33e}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20040000}, 0x4000040) 16:35:43 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040409101a020200", 0x33a) 16:35:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1d01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:43 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040509101a020200", 0x33a) 16:35:43 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200), 0x0) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1d02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:43 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040609101a020200", 0x33a) 16:35:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="11b2727a105c27802a1d31ea3b69a3266ae71876225cf7ad95bc31a7453efdd89ef413cba006da81efeb3f6b73"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) 16:35:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1, @ANYRESOCT=r0], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002000) 16:35:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1d03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:44 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040709101a020200", 0x33a) [ 735.003388][ T27] kauditd_printk_skb: 9 callbacks suppressed [ 735.003402][ T27] audit: type=1804 audit(1594658144.043:1297): pid=9213 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/546/cgroup.controllers" dev="sda1" ino=16381 res=1 16:35:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1e00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 735.205474][ T27] audit: type=1804 audit(1594658144.093:1298): pid=9222 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/502/cgroup.controllers" dev="sda1" ino=16384 res=1 16:35:44 executing program 3: r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.stat\x00', 0x275a, 0x0) bind$isdn_base(r0, &(0x7f0000000140)={0x22, 0x99, 0x1, 0xff, 0x9}, 0x6) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000240)={0x0, 0x6b8b, 0x400000000007ff00}) r3 = accept4$unix(r2, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6d328ef478c70a77, 0x0) accept4$unix(r3, &(0x7f0000000240)=@abs, &(0x7f0000000300)=0x6e, 0x80000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100000500) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x2c, &(0x7f00000002c0), 0x26d) setsockopt$sock_attach_bpf(r1, 0x1, 0x2c, &(0x7f00000002c0), 0x4) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='erspan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_SET_BSS(r2, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8b65ca042b66e33e}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20040000}, 0x4000040) 16:35:44 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040809101a020200", 0x33a) 16:35:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) 16:35:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1e01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 735.605757][ T27] audit: type=1804 audit(1594658144.644:1299): pid=9243 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/547/cgroup.controllers" dev="sda1" ino=16370 res=1 16:35:44 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200), 0x0) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x4010, r0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000003c0)=r0, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r8}}, 0x20}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r4, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="040026bd7000ffdbdf2511000000080032000700000008000b00070000000500370000000000080039000500000008003b000100000005002d000000000008003a000400000008000300", @ANYRES32=r8, @ANYBLOB="080032000000400005002a8d3a0000009b04dde1a7b8998c58bd65e4b6c1698e1c5dbe6aa6a4080774689e7f405ab0666009b49ef95604045abbddb6d90d7c6f71f6d9f8ca1c628c0e55d780bcd28184215007b7205f5747ea00d2c80000000cc5e9eb7b6c562f076a85cbc88eea38ab189b888aaed3fa2f740c72c1a579cdd18c229ae4b91aeefaf782d2c7d7e3ed8e62abfd0957a92f0a8a8de1e4"], 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x10) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000400)={'syzkaller1\x00', {0x2, 0x4e22, @rand_addr=0x64010102}}) poll(&(0x7f0000000100)=[{r3, 0x200}, {r0, 0x8062}, {r1, 0x20}], 0x3, 0x58b) 16:35:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1e02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:44 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040909101a020200", 0x33a) 16:35:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1e03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:45 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040a09101a020200", 0x33a) 16:35:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f00000000c0)={0x6, 'batadv0\x00', {0x97}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) setsockopt$rose(r0, 0x104, 0x2, &(0x7f0000000040)=0x400, 0x4) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) 16:35:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1f00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 736.239454][ T27] audit: type=1804 audit(1594658145.284:1300): pid=9265 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/548/cgroup.controllers" dev="sda1" ino=16002 res=1 [ 736.275908][ T9265] validate_nla: 2 callbacks suppressed [ 736.275917][ T9265] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 736.335006][ T9265] __nla_validate_parse: 16 callbacks suppressed [ 736.335015][ T9265] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:35:45 executing program 3: r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.stat\x00', 0x275a, 0x0) bind$isdn_base(r0, &(0x7f0000000140)={0x22, 0x99, 0x1, 0xff, 0x9}, 0x6) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000240)={0x0, 0x6b8b, 0x400000000007ff00}) r3 = accept4$unix(r2, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6d328ef478c70a77, 0x0) accept4$unix(r3, &(0x7f0000000240)=@abs, &(0x7f0000000300)=0x6e, 0x80000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100000500) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x2c, &(0x7f00000002c0), 0x26d) setsockopt$sock_attach_bpf(r1, 0x1, 0x2c, &(0x7f00000002c0), 0x4) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='erspan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_SET_BSS(r2, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8b65ca042b66e33e}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20040000}, 0x4000040) 16:35:45 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040c09101a020200", 0x33a) 16:35:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1f01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000300)=0x1c, 0x80000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r4}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400)={0x2, 0xeea, 0x0, 0x6, 0x8, 0x5, 0x7f, 0x7, r4}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400)={r4}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)={r4, 0x10, "1a0be6785a7184d937cbfe305167caf8"}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0x6a8d, 0x3f, 0x8004, 0x6, 0x6b, 0x8, 0x20, 0x8001, r5}, 0x20) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0xffffffff, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r1, 0x0, 0x100000000) 16:35:45 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{0x0}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) [ 736.719434][ T9277] netlink: 798 bytes leftover after parsing attributes in process `syz-executor.2'. [ 736.861410][ T27] audit: type=1804 audit(1594658145.904:1301): pid=9255 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/503/cgroup.controllers" dev="sda1" ino=16380 res=1 [ 737.013802][ T27] audit: type=1804 audit(1594658145.934:1302): pid=9257 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/503/cgroup.controllers" dev="sda1" ino=16380 res=1 [ 737.108803][ T27] audit: type=1804 audit(1594658145.934:1303): pid=9279 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/503/cgroup.controllers" dev="sda1" ino=16380 res=1 [ 737.209141][ T27] audit: type=1804 audit(1594658145.964:1304): pid=9285 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/549/cgroup.controllers" dev="sda1" ino=16375 res=1 16:35:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1f02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:46 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040e09101a020200", 0x33a) 16:35:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB], 0x3c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="580000000206010000f4ffffff000000000000000900020073797a320000000014000300686173683a69702c706f72742c6970000c000780080012409effffff050001000700000005000400e7ffffff04000500020000005cd59fe07a8a0c4dcb91a412674eaaf491d99f39c932495fcfca03c477e60ce1188d4a1548869515943ce92357d5e78ac958d103b3798da51d3fa9f619dda3761f40b7ed8a623b518c2e"], 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="28000000040601", @ANYRESDEC, @ANYRES16=r2], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) 16:35:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) write$binfmt_script(r3, &(0x7f0000000340)=ANY=[@ANYRES64=r4, @ANYRESDEC=r2, @ANYRESHEX, @ANYBLOB="ab8c7f43af0c5f3af915c7546b6644cc07bc176a5fde6bf6bf1cb23ed2f8ea299b8ce046644bbd1367575f60c97e0aa07e6dcf099fbd2e55c7e3b98f9c9e95de04fefe3eb2250e764981a188fa22ddb6d26488c25ae12d20d99c5734783b644c0df98df2b8ac63181c3e8ecacdce25be8d72b989c7dde205c1d49e3d0ef371123af2e2b656d097a2476869e7678ce63afaa927fed0ebd0785f56b2720787d7ec12f0e59e04c63847751dabeb690f648bdfb9430e6af6f15bb0ababd5d44488cfe124c5c544d6ad76a8", @ANYRES16], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x30, 0x0, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @multicast1}}]}, 0x30}}, 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x5c}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}]}, 0x34}, 0x1, 0x0, 0x0, 0xc4}, 0x24048040) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) accept$unix(r0, &(0x7f0000000100), &(0x7f0000000180)=0x6e) sendfile(r7, r6, 0x0, 0x100002000) [ 737.404877][ T9298] netlink: 798 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1f03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:46 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040f09101a020200", 0x33a) [ 737.518554][ T27] audit: type=1804 audit(1594658146.564:1305): pid=9299 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/550/cgroup.controllers" dev="sda1" ino=16383 res=1 16:35:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000100), 0x2) sendfile(r2, r1, 0x0, 0x100002000) [ 737.633989][ T9310] netlink: 798 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:46 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200), 0x0) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2000}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:46 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{0x0}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:46 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c041009101a020200", 0x33a) 16:35:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x100, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) socket$inet(0x2, 0x5, 0x1000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) [ 737.882074][ T27] audit: type=1804 audit(1594658146.924:1306): pid=9314 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/505/cgroup.controllers" dev="sda1" ino=16368 res=1 16:35:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2001}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 738.024565][ T9325] netlink: 798 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:47 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c044809101a020200", 0x33a) [ 738.091182][ T9323] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 738.128441][ T9323] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:35:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2002}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 738.239621][ T9335] netlink: 798 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:47 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c044c09101a020200", 0x33a) 16:35:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2003}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) sendfile(r2, r1, 0x0, 0x100000000) 16:35:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000100)={0x1, 0x0, 0x200}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000000)=0x3f) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002000) [ 738.480341][ T9343] netlink: 798 bytes leftover after parsing attributes in process `syz-executor.2'. [ 738.737246][ T9349] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 738.752207][ T9349] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:35:47 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x88) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) write$binfmt_elf32(r1, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x892) setsockopt$inet6_udp_int(r0, 0x11, 0x20000100000000a, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x800000c800, &(0x7f0000000000)={0xa, 0x200000000004e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:35:47 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c046009101a020200", 0x33a) 16:35:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2100}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:47 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{0x0}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2101}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 738.992103][ T9361] netlink: 798 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:48 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x88) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) write$binfmt_elf32(r1, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x892) setsockopt$inet6_udp_int(r0, 0x11, 0x20000100000000a, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x800000c800, &(0x7f0000000000)={0xa, 0x200000000004e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:35:48 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c046809101a020200", 0x33a) 16:35:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2102}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r3 = accept4(r2, &(0x7f0000000200)=@tipc=@name, &(0x7f0000000040)=0x80, 0x800) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000000c0)=@v2={0x2, @aes256, 0x1, [], "2b6a0dfd43ba9f9fe94ebab27ef616ae"}) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x800, 0x0, 0x0, {}, [{@pci={{0x0, 0x1, 'pci\x00'}, {0x0, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0xfffffffffffffd64}}]}, 0x3c}}, 0x20000000) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000000) 16:35:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macsec0\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f0000000080)=0x4, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000004000000", @ANYRES32=r4, @ANYBLOB="00000000000000001c0012000b0001006272696467650000"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x20000040) 16:35:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100002000) 16:35:48 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c046c09101a020200", 0x33a) 16:35:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2103}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:48 executing program 3: unshare(0x400) connect$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendto$rose(r0, &(0x7f0000000000)="d8dee0a89099b881ce89e5c7f9f9c84090e7f21fe33892cde8c405b4d9d608bdbebd3c3bf42d045b", 0x28, 0x40011, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @default}, 0x1c) 16:35:48 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c047409101a020200", 0x33a) [ 739.495586][ T996] tipc: TX() has been purged, node left! [ 739.635520][ T996] tipc: TX() has been purged, node left! 16:35:48 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280fadbbbbbbce"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000000) 16:35:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2200}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xa2f, @ipv4={[], [], @broadcast}, 0x5caba48a}, 0x1c) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, 0x0, 0x0) 16:35:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$rxrpc(0x21, 0x2, 0xa) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070001040000002000ef00000000000008200640000903ff0500090007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$sock(r2, &(0x7f0000000380)={&(0x7f0000000100)=@tipc=@name={0x1e, 0x2, 0x3, {{0x43, 0x1}, 0x2}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000200)="2c51f4596e02e90f7d121d72b40df41c0e237747982a25be5238f3fe58ee27e9a66c089b8b1a58d1d4ae37e13341c649063f7dc4fa748f6626cfeb578c3ea84e07ffcac3e2e74d15990ec5291a654b2b3b0e0770db111e5af2d7efd1bb5b9f29c13fc6d5c987e909a071c01d8358bbb373cf499c1c7b37dd5bcff09fdf5f09c0e3de55c5d98ac52987b59301911ca3ba8bc2b0a120ebe6b66b45f96c05f8dc4edb935ae0382b6dc2df8033d69ba62e11c452fecd", 0xb4}, {&(0x7f0000000180)="a24a66f829cca27175ddac892c4390b613a30fa32e1bd0261b83835e370e9746", 0x20}], 0x2, &(0x7f0000000300)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x100000000}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}], 0x48}, 0x0) sendfile(r2, r1, 0x0, 0x100002000) 16:35:48 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c047a09101a020200", 0x33a) 16:35:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2201}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:49 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04000a101a020200", 0x33a) 16:35:49 executing program 3: syz_emit_ethernet(0x96, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffff4165f1e6adde910002008100050086dd6000000000583c00fe800000000000000000000000000000ff020000000000000000010000000001110804040008040000000000000000000000000000000000fc02000000000000000000000000000100000000000000000000000000000001fe88000000000000000000000000010186009078000000000000000000000000c4a99c11e80698cb283e2da2f8018e82856795dd1a20ac3c678f7da02d83113054"], 0x0) r0 = socket(0x2a, 0x1, 0xaf) accept4$tipc(r0, &(0x7f0000000000)=@name, &(0x7f0000000040)=0x10, 0x0) 16:35:49 executing program 0: getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000002c00)={0x0, 0x9}, &(0x7f0000002c40)=0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000540)=@pptp={0x18, 0x2, {0x0, @local}}, &(0x7f00000004c0)=0x80, 0x80800) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000005c0), &(0x7f00000003c0)=0x14) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c00000082a28cceea434526ae50f6046088828516d98d94eb534a038b7ec9e1c46f4158a5d94829002835b60c598c206a003ef11b2dcda09fc1d6feb05a2d7d761672846eaafad993ca63815a910742315e806627f6851865d6ce006d84ab9f9161f1e392183a773d89c14e582833db5d56ca7d0030fb6b72034462bf3703d108f4247508c63ac89f9f6b6bfd22c182448a2154fafc63908439a63b42", @ANYRES32=0x0, @ANYRES32=r2, @ANYRES32=0x0, @ANYBLOB="077b26978a164d87edbd84129f45f556dbd9e69584755ae7d46bf0080f1112e0951149c12f2a782c9e28ad16e960df8ff65625fa616ddc71756dc4ea9549f00965b24ebbb364ee6380d5f0173c61e7e48f760fddec75ea2818ac92ec3decf2e5f8df07c5a4ef2ff80310169dd8becb993989f2180f0a250d829c73f905f9795a5c5a48283d4256a973282d312acf6c5be33c3d00b4c22e6f31e6f023dfbc009b3765568bccaa1237942d3a6b903025e817e374b75b303d1417340000"], 0x3c}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000000) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000640)=0x14) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d04000000000000000010000000", @ANYRES32=r6, @ANYBLOB], 0x20}}, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000340)=@buf={0x2f, &(0x7f0000000300)="3bd329d970a9c3e605aad05135d9352802f21909057be4078852de64dd89f8324c4a60c2b6e325c5e81fe7913e3fbc"}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=@bridge_getneigh={0x80, 0x1e, 0x300, 0x70bd2c, 0x25dfdbfd, {0x7, 0x0, 0x0, 0x0, 0x110}, [@IFLA_MASTER={0x8, 0xa, r6}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x3}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xef33}, @IFLA_PHYS_PORT_ID={0x11, 0x22, "faa944940ef273d1cd9081afc8"}, @IFLA_MAP={0x24, 0xe, {0x0, 0x3, 0x101, 0x88, 0x28, 0x6d}}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0xc9f}, @IFLA_GROUP={0x8, 0x1b, 0x7}]}, 0x80}, 0x1, 0x0, 0x0, 0x20008000}, 0x44010) [ 740.041847][ T9424] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2202}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:49 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04000b101a020200", 0x33a) [ 740.252477][ T27] kauditd_printk_skb: 6 callbacks suppressed [ 740.252495][ T27] audit: type=1804 audit(1594658149.294:1313): pid=9432 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/555/cgroup.controllers" dev="sda1" ino=15762 res=1 [ 740.289876][ T9437] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 740.485499][ T27] audit: type=1804 audit(1594658149.524:1314): pid=9436 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/555/cgroup.controllers" dev="sda1" ino=15762 res=1 [ 740.545606][ T27] audit: type=1804 audit(1594658149.524:1315): pid=9432 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/555/cgroup.controllers" dev="sda1" ino=15762 res=1 16:35:49 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:49 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) syz_emit_ethernet(0x22, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaab90982e32fef9008004500001400000000fd009078ac1e0001ac1414aa5ad1ef42f099eecc1ebe7b5beef16d73557d331ce4a5eea3f6ff3a1c28010000000000000006607a0db483b9227cd2b5b3"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.swap.current\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x82051, r3, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)) r4 = openat$cgroup_ro(r3, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) connect$l2tp(r4, &(0x7f00000000c0)={0x2, 0x0, @remote, 0x3}, 0x10) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000040)=0x2) 16:35:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2203}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)={'#! ', './file0', [{0x20, '&\a'}, {0x20, ':'}, {0x20, '/{'}, {0x20, '/'}, {0x20, '[.'}, {0x20, 'cgroup.controllers\x00'}, {0x20, '(.'}], 0xa, "fac26c294b78d428614e534633b19bcdc842d7e4ec53dd30d24d16edf2713b050db07fa87a147b7500d648a57f0d51ddc5ea9ee80c5ea28d1c583b41fc981a14a55fb97ee2"}, 0x74) sendto$inet(r0, &(0x7f0000000200)="f443a66500b128263d311bca67f8ab0b6daf84dc29531756ff10e79550f45a4f85312a2e5869eb14a7ff95022f47c2321d6f8e0302213c44b7ebe5d987dd30ddece859489da51053a0a5df2ee35afc6628d4e5d528d690132f8dd0d2c5d04707727d56314bd0f6c240f17182270794a8573618a6e0d63f4a31bac7b46b4ec622c43502ad15747a", 0x87, 0x80, &(0x7f0000000180)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002000) 16:35:49 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04000c101a020200", 0x33a) 16:35:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.swap.current\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x82051, r0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.swap.current\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0xe53193aa3162e6f2, 0xffffffffffffffff, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000240), &(0x7f0000000280)=0x40) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000040)={{0x2, 0x1}, 0x3c}, 0x10) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="3adef5eb15149f4f0ee15b43c6e2970b685e157f0a061d0a65d7cb8fca250f3dc7696bffe48e09e69730b654e767d71dc20517744bdeb745e2f7d5e7c0c3952dac95b649f6c13bf753b0c0c6133a51d29fb3807bc77e6b1c9e5eb542c5de2902dd4ca95a651f6112d3c93ccbb423f3494af14cc3168a05b0fcb2197b2f9f043f139a9064eee30000000000"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r3, 0x0, 0x100000000) 16:35:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2300}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 740.780601][ T9454] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:49 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04000d101a020200", 0x33a) [ 740.866808][ T27] audit: type=1804 audit(1594658149.914:1316): pid=9453 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/509/cgroup.controllers" dev="sda1" ino=16384 res=1 16:35:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) write$nbd(r0, &(0x7f0000000200)={0x67446698, 0x1, 0x1, 0x4, 0x2, "6cc4fd3e4acc83179ed4cb5d90deaf0f3d69c862420a06b706c3c54e183fbf794a61961667c5bddc67b2c49888623dfa884c749a7f961551f56484691146b58e1635ba69c7a3f323110f2ebf59a065131af8aa5d5b52d71024f2af0ec5c941b0125c3778f1b68db4042a26a25b15983cac7dc9a5b008df02eff7284c0847353c3bc4d458054170d2874ea0255d7f23fd298b93d5f5555807b06b61088f94c78181df928b07a2a1e2bdf2f453fcdff7b6e673841c7f5a24804e2fccf0c0d3492f7e4f85"}, 0xd3) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000040)=0x6, &(0x7f00000000c0)=0x4) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) 16:35:50 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_sctp(0xa, 0x801, 0x84) socket$inet6_sctp(0xa, 0x801, 0x84) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) socket$inet6_sctp(0xa, 0x5, 0x84) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r4 = socket$netlink(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000000230000000000000f10ffe708000300", @ANYRES32=r6], 0x1c}}, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x30, r7, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @multicast1}}]}, 0x30}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x4c, r7, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_PEER_V4={0x8, 0x8, @empty}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e23}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x3b}]}, 0x4c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016170a00", @ANYRES32=r4], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 16:35:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2301}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 740.999912][ T9467] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:50 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04000e101a020200", 0x33a) [ 741.142245][ T27] audit: type=1804 audit(1594658150.184:1317): pid=9469 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/505/cgroup.controllers" dev="sda1" ino=16369 res=1 [ 741.202866][ T9472] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 741.263348][ T27] audit: type=1804 audit(1594658150.224:1318): pid=9475 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/557/cgroup.controllers" dev="sda1" ino=16367 res=1 [ 741.312929][ T9478] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 741.345372][ T9478] __nla_validate_parse: 13 callbacks suppressed [ 741.345380][ T9478] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:50 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2302}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:50 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000300)={0x6, 0xfff, 0x8}, 0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x62900}, &(0x7f00000002c0)=0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket(0x10, 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000340)={0xfff}, 0x4) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24eeffffef88ecff3600000000ef000000000000080006400004af686ca2e0bba8"], 0x1}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYRES64=r2], 0x70}, 0x1, 0x0, 0x0, 0x20040891}, 0x240088d5) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x14) sendfile(r4, r3, 0x0, 0x100002000) 16:35:50 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040011101a020200", 0x33a) 16:35:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000300)=0x1c, 0x80000) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80000, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r3}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400)={0x2, 0xeea, 0x0, 0x6, 0x8, 0x5, 0x7f, 0x7, r3}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400)={r3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={r3, 0x2c, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x5, @remote, 0x6}, @in={0x2, 0x4e21, @loopback}]}, &(0x7f0000000280)=0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="d71ac366b1bf34f5d1c56580a9792344de614053929a44"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="20e7000004011cc118dc0667af4684fe97754cb77ed2afe04823f1f38ebf88958669fc9089aa72a69df294e02c56b128b61751c7cddd2f4e743b4446506867ebdb0a6973a12f6741c1ef5e7d3f5f4f0dd0412954d3e60f4f3fc3a727431c886b66549dc6bb3058ad07f572f357e426441c"], 0x1}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100000000) ioctl$int_out(r5, 0x5460, &(0x7f0000000040)) 16:35:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f00000000c0)={r5, 0x8}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000063c0)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x60}}}, 0x24}}, 0x0) 16:35:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2303}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 741.763353][ T9493] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 741.791924][ T9493] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x1407, 0x400, 0x70bd28, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}]}, 0x1c}, 0x1, 0x0, 0x0, 0x100c0010}, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x3}) sendfile(r2, r1, 0x0, 0x100002000) accept4$x25(r1, &(0x7f00000002c0), &(0x7f0000000300)=0x12, 0x80800) [ 741.848874][ T9498] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 741.926287][ T27] audit: type=1804 audit(1594658150.974:1319): pid=9492 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/558/cgroup.controllers" dev="sda1" ino=16379 res=1 16:35:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2400}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:51 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040012101a020200", 0x33a) [ 742.019098][ T9509] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 16:35:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2401}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 742.107777][ T9521] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 742.136898][ T9521] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:51 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r1, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4800000010001fff000005000000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0120000000000000"], 0x48}}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062726964676500000400028008000a00", @ANYRES32=r5], 0x3c}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r7}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$TIPC_DEST_DROPPABLE(r8, 0x10f, 0x81, &(0x7f0000000240), &(0x7f0000000280)=0x4) [ 742.165089][ T27] audit: type=1804 audit(1594658151.204:1320): pid=9518 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/511/cgroup.controllers" dev="sda1" ino=16361 res=1 [ 742.299589][ T9530] netlink: 'syz-executor.3': attribute type 29 has an invalid length. 16:35:51 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400", 0x6}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:51 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040044101a020200", 0x33a) 16:35:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2402}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r2, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) [ 742.696960][ T9551] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 742.729661][ T9551] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2403}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmsg$rds(r4, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/156, 0x9c}], 0x1}, 0x4008080) sendmsg$alg(r4, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, 0x0, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r6, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1f, 0x0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r7 = accept4(r5, &(0x7f0000001cc0)=@in6, &(0x7f0000001d40)=0x80, 0x800) connect$vsock_stream(r7, &(0x7f0000001d80), 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) sendto$rxrpc(r8, &(0x7f0000000600)="4e2ab23d70ab886c58e4ae6ff73490b9c4203a1b490eb0974d2812a81c0b00df20f5abd82199ed6b005bef7694f5bcef68ea46472350aa947504bab0320b6060d51cce", 0x43, 0x1, &(0x7f0000000340)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r6}}, 0x18}}, 0x0) [ 742.813438][ T27] audit: type=1804 audit(1594658151.854:1321): pid=9552 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/559/cgroup.controllers" dev="sda1" ino=16377 res=1 [ 742.838128][ T9552] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 16:35:51 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04005a101a020200", 0x33a) [ 742.880516][ T9552] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 742.943395][ T27] audit: type=1804 audit(1594658151.894:1322): pid=9524 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/511/cgroup.controllers" dev="sda1" ino=16361 res=1 16:35:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r3, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r6, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r7 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r7, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_MGMT_A_DOMAIN={0x17, 0x1, 'cgroup.controllers\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x280080c0}, 0x40000) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="3000000021007000fedbdf250a2000065100000018000000140001000000000000000000000000000000000100000000"], 0x30}, 0x1, 0x0, 0x0, 0x20000010}, 0x800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, 0xffffffffffffffff, 0x0, 0x100002000) 16:35:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2500}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 742.992245][ T9565] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 16:35:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2501}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 743.094706][ T9566] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 743.118674][ T9566] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 743.179995][ T9567] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 16:35:52 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040069101a020200", 0x33a) [ 743.273676][ T9578] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 16:35:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2502}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 743.409264][ T9584] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 16:35:52 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400", 0x6}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:52 executing program 3: r0 = socket(0x18, 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000e40)={0x1d, r3}, 0x18) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="440000001000810500000046ded124e65b9454e0", @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB="79d97b7c0e4256f0b3942d727813dab0c0f04614662121f819b1e33209d06d33d8f777ea6c9f7cbc1f9ba61f44c2fb0c76a2e2aaf3d578bc3f0341e237d4065cf34d330eef2a6aaba54f0d1063b860e09671ae61b58723cbc029f89aee5db3532f150f81f37d4614c586f1cdcdf1fe71852be85da92cdf8508e3f197edc6"], 0x44}}, 0x0) 16:35:52 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, 0x3f7, 0x2, 0x70bd2d, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0xc0}, 0x4010) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000180)=0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r0, 0x0, 0x100000000) 16:35:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2503}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 743.572119][ T9624] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2600}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:52 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040002001a020200", 0x33a) 16:35:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x0, 0x1ff, 0x40, 0x18, r2, 0x101, [], 0x0, r1, 0x1, 0x0, 0x4}, 0x40) mmap(&(0x7f000026d000/0x1000)=nil, 0x1000, 0x1000000, 0x10, r3, 0xc922f000) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000000) 16:35:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x28011, r0, 0x99d6000) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400070601040000000005ef00000000000008000640000903ff05000100070000"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$l2tp6(0xa, 0x2, 0x73) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="5800000002919de2ea4c22b47ba7e00601180000000000000000000000000900020073797a320000000014000300686173683a69702c706f72742c6970000c000780080012409effffff050001000700000005000400000000000500050002000000ff57b4f52cca399424d1846147689154c59a151e6f7c0a8fa69ab62024c5c089f117c0b6a83b575cdc1b54295f60f507d31c5189a6462e1f6176a2121e3d11962a9eb0127650cee91d1147fa49401a23fbefa7d37266841cf544034f5b32576fac97697583d11a0a991616311749e551c7e58952e1fed8c7f7d61a1e63e79df1"], 0x58}}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x20) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)={0xa37c, 0x9, 0xa, 0x0, 0x0, [{{r4}, 0x1f}, {{}, 0xe4}, {{r2}, 0x800}, {{r5}, 0x3}, {{r6}, 0x6aa}, {{r0}, 0x2}, {{r7}, 0x6}, {{r1}, 0x8}, {{}, 0x8}, {{r8}, 0x1000}]}) sendfile(r2, r1, 0x0, 0x100002000) 16:35:52 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x1e, &(0x7f00000001c0)=0xaa, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000006f00)=[{{&(0x7f0000002800)=@ipx, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000002880)=""/56, 0x38}, {&(0x7f00000028c0)=""/224, 0xe0}, {&(0x7f00000029c0)=""/190, 0xbe}, {&(0x7f0000002a80)=""/32, 0x20}, {&(0x7f0000002ac0)=""/61, 0x3d}, {&(0x7f0000002b00)=""/92, 0x5c}, {&(0x7f0000002b80)=""/30, 0x1e}], 0x7}, 0x400}, {{&(0x7f0000002c40)=@caif=@util, 0x80, &(0x7f0000002d40)=[{&(0x7f0000002cc0)=""/70, 0x46}], 0x1, &(0x7f0000002d80)=""/182, 0xb6}, 0x401}, {{0x0, 0x0, &(0x7f00000041c0)=[{&(0x7f0000002e40)=""/134, 0x86}, {&(0x7f0000002f00)=""/96, 0x60}, {&(0x7f0000002f80)=""/4096, 0x1000}, {&(0x7f0000003f80)=""/187, 0xbb}, {&(0x7f0000004040)=""/144, 0x90}, {&(0x7f0000004100)=""/135, 0x87}], 0x6, &(0x7f0000004240)=""/4096, 0x1000}, 0x52}, {{0x0, 0x0, &(0x7f0000005280)=[{&(0x7f0000005240)=""/64, 0x40}], 0x1, &(0x7f00000052c0)=""/73, 0x49}, 0x5}, {{0xfffffffffffffffd, 0x0, &(0x7f0000005380)=[{&(0x7f0000005340)=""/59, 0x3b}], 0x1, &(0x7f00000053c0)=""/91, 0x5b}}, {{&(0x7f0000005440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000069c0)=[{&(0x7f00000054c0)=""/152, 0x98}, {&(0x7f0000005580)}, {&(0x7f00000055c0)=""/138, 0x8a}, {&(0x7f0000005680)=""/203, 0xcb}, {&(0x7f0000005780)=""/55, 0x37}, {&(0x7f00000057c0)=""/134, 0x86}, {&(0x7f0000005880)=""/6, 0x6}, {&(0x7f00000058c0)=""/4096, 0x1000}, {&(0x7f00000068c0)=""/202, 0xca}], 0x9}, 0xdadc}, {{&(0x7f0000006a80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000006b00)=""/230, 0xe6}, {&(0x7f0000006c00)=""/126, 0x7e}, {&(0x7f0000006c80)=""/249, 0xf9}, {&(0x7f0000006d80)=""/106, 0x6a}], 0x4, &(0x7f0000006e40)=""/148, 0x94}, 0x3331}], 0x7, 0x0, &(0x7f00000070c0)={0x0, 0x3938700}) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000007100)={0x18, 0x0, {0x2, @multicast, 'caif0\x00'}}) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000007140)=@req3={0x5b2, 0x6, 0x1f, 0xb1d, 0x0, 0x10000000, 0x3}, 0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000007180)={0x0, 0x5}, &(0x7f00000071c0)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000007200)={r2, 0x5}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000007240)={r2, 0x81}, &(0x7f0000007280)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000072c0)={r3, 0x7ff}, &(0x7f0000007300)=0x8) r4 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000007740)=0xffffffff, 0x4) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000007780)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f00000077c0)={0x9b75, 0x2, 0x0, 0x6}, 0x8) bind(r1, &(0x7f0000007800)=@nfc_llcp={0x27, 0x0, 0x2, 0x7, 0xa9, 0x0, "94b9b2f121e66b37e3547f10ada9b8213afb9f18d34c4ab9e83ff48ac3b9e9df54e72f45fe0c5c874013ec8a4b09327e6d57672bce4a684b77fe49a952317e", 0x12}, 0x80) r6 = syz_genetlink_get_family_id$gtp(&(0x7f00000078c0)='gtp\x00') r7 = ioctl$TUNGETDEVNETNS(r5, 0x54e3, 0x0) sendmsg$GTP_CMD_GETPDP(r5, &(0x7f0000007980)={&(0x7f0000007880)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000007940)={&(0x7f0000007900)={0x24, r6, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_I_TEI={0x8, 0x8, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r8 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000079c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x1f}, 0x10) ioctl$FS_IOC_GETFSMAP(r8, 0xc0c0583b, &(0x7f0000007a00)={0x0, 0x0, 0x6, 0x0, [], [{0x3ff, 0x5, 0xffffffffffff1988, 0x1, 0x9, 0x56f}, {0x800, 0x8, 0x1f, 0x10000, 0x6, 0x3}], [[], [], [], [], [], []]}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r5, 0x6, 0x2, &(0x7f0000007c40)={0x2, "f8489d"}, 0x6) 16:35:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2601}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:53 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040003001a020200", 0x33a) 16:35:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2602}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:53 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400", 0x6}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x102) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYRESOCT=r3, @ANYRES32=r2], 0x1}}, 0x4000084) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000001) 16:35:53 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040007001a020200", 0x33a) 16:35:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000250000000e0001006e657464657673696d0000e5b957dc13081bab64657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB], 0x3c}}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000280)=0xc) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r5, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff30000000000000000e1ff", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="140012000b000100627269646765"], 0x3c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="73797a743ee6e965ab49f5102e16376e6c3200000000000800ba82", @ANYRES32=r5, @ANYBLOB="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"]}) getsockopt$inet6_dccp_int(r2, 0x21, 0x10, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="060400ff040601"], 0x1}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r1, 0x0, 0x100000000) 16:35:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2603}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2700}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:53 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009001a020200", 0x33a) 16:35:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x4c, 0x4, 0x8, 0x5, 0x0, 0x0, {0x7, 0x0, 0x1}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x3a}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x8}]}]}, 0x4c}}, 0x800) setsockopt$inet6_dccp_buf(r0, 0x21, 0xc, &(0x7f0000000280)="ca4b33acd9c64b1563357a1aa0c8832222da9e69b8e58aad03a1952b0555c8e3b6b85d8ab5ab0092e6ab490eda8c6e94c0916c3f8791aaa0ec2e976070aa61101b464f7756701e18e9469d68ffb49f2324fea9394beefb622db96d4bffa2b44325f5fd346c48ab90dcb72d209e94cc89b4ee6cc1239086a824b57de82d4e6f7a83516e8a198f36258bbfeae9dda8ce2363e03e17610cbfd53b60541aa388eb6cb09df41cbc9b94702ed958323b8d94a616ac99efe565beb2cc5b5bb51da262", 0xbf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) 16:35:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = socket$nl_rdma(0x10, 0x3, 0x14) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) splice(r2, &(0x7f0000000040)=0xb, r3, &(0x7f0000000080)=0xfffffffffffeffff, 0x6, 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000001300)={0x2880008, r1}) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) 16:35:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2701}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:54 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04000f001a020200", 0x33a) 16:35:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r4 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)={0x24, r3, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_TXQ_QUANTUM={0x8}]}, 0x24}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r9, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff30000000000000000e1ff", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r9, @ANYBLOB="140012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x68, r3, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xfffffe01, 0x1}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x59ba4686, 0xffffffffffffffff}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x2}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x68}}, 0x90) sendfile(r2, r1, 0x0, 0x100000000) [ 745.323882][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 745.323895][ T27] audit: type=1804 audit(1594658154.364:1330): pid=9784 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/563/cgroup.controllers" dev="sda1" ino=16364 res=1 16:35:54 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9f", 0x9}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2702}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:54 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04001e001a020200", 0x33a) [ 745.559944][ T27] audit: type=1804 audit(1594658154.374:1331): pid=9783 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/514/cgroup.controllers" dev="sda1" ino=16370 res=1 [ 745.563539][ T9786] bond19: (slave bridge12): making interface the new active one [ 745.616634][ T9786] bond19: (slave bridge12): Enslaving as an active interface with an up link 16:35:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2703}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:54 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040002101a020200", 0x33a) 16:35:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x37, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b32"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x54}}, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x3d, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0xfffffffffffffe60, 0x0, 0x0, &(0x7f0000000380)=[{0x18, 0x110, 0xa, "9e85990f47c1e378d347e4b3145aac46b9016f575ead3afe3e1926be8782994d38c1066afecbd99c4eed5c0691d4103c36fd2a555c5b244dfffff271b5a9bacc0c9ff60e75302db4932ca2d646d502140ceaea1076173e4b174bf39b5a68d29028e14456f238851e697ee061dbff86a5d0e76994a6b101d0b768fbf23eb035f8139f70ee4edd8026246540a50295241c469a96c7843b3d73b1bbfd7fa846"}], 0x18}}], 0x2, 0x4004000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x7, @private2={0xfc, 0x2, [], 0x1}, 0x9}], 0x1c) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000180)={@private}, &(0x7f0000000240)=0xc) 16:35:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="a0fac4d7f5d11daa789524000000150601040000000000ef000000000000080006846ccd396daa5ea6ecd981148c8c00fce3fd6d425328f5f90a791a5c3276eb2a8c177e147a2c04fbd3300d639c59a7c29ee404642a7c2aff20f03805a988bd371694569a04ff7a48a0c5cc9e6f04097b41bedfac073cf6123a36b894d40d4b78f6c755cb61d137b4a5cc04323bd7"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$inet(r3, &(0x7f0000000100)=""/101, 0x65, 0x40010123, &(0x7f0000000180)={0x2, 0x4dcc, @private=0xa010100}, 0x10) sendfile(r2, r1, 0x0, 0x100002000) 16:35:54 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040003101a020200", 0x33a) 16:35:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2800}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:55 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040004101a020200", 0x33a) 16:35:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x4c, 0x4, 0x8, 0x5, 0x0, 0x0, {0x7, 0x0, 0x1}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x3a}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x8}]}]}, 0x4c}}, 0x800) setsockopt$inet6_dccp_buf(r0, 0x21, 0xc, &(0x7f0000000280)="ca4b33acd9c64b1563357a1aa0c8832222da9e69b8e58aad03a1952b0555c8e3b6b85d8ab5ab0092e6ab490eda8c6e94c0916c3f8791aaa0ec2e976070aa61101b464f7756701e18e9469d68ffb49f2324fea9394beefb622db96d4bffa2b44325f5fd346c48ab90dcb72d209e94cc89b4ee6cc1239086a824b57de82d4e6f7a83516e8a198f36258bbfeae9dda8ce2363e03e17610cbfd53b60541aa388eb6cb09df41cbc9b94702ed958323b8d94a616ac99efe565beb2cc5b5bb51da262", 0xbf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) [ 746.071239][ T27] audit: type=1804 audit(1594658155.114:1332): pid=9850 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/515/cgroup.controllers" dev="sda1" ino=16382 res=1 16:35:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2801}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:55 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9f", 0x9}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:55 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040005101a020200", 0x33a) 16:35:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2802}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x64, r3, 0x536ae464467e3e0b, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x64}}, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x14, r3, 0x300}, 0x14}}, 0x20004850) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.swap.current\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x82051, r5, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'wg0\x00'}) [ 746.365154][ T27] audit: type=1804 audit(1594658155.404:1333): pid=9859 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/514/cgroup.controllers" dev="sda1" ino=16369 res=1 [ 746.486416][ T9867] validate_nla: 10 callbacks suppressed [ 746.486426][ T9867] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:35:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2803}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 746.575033][ T9867] __nla_validate_parse: 7 callbacks suppressed [ 746.575043][ T9867] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000500) r2 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) write$binfmt_script(r3, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'veth1_virt_wifi\x00'}, {0x20, 'cgroup.controllers\x00'}, {0x20, 'cgroup.controllers\x00'}, {0x20, '@-+\\\\'}, {0x20, '^'}, {0x20, ','}], 0xa, "7e452c4cf79b60e8cc904ab7d475bacf247a2c5c6ab0ee5ca394ea1a6a4671c558e7e557010bff9bc6b99dd78fa288c5ad6829ff8121ec17a2a038ab69664ddd85899d"}, 0x91) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100002000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r5, 0x8982, &(0x7f0000000180)={0x1, 'wg2\x00', {}, 0x73}) ioctl$sock_SIOCGIFCONF(r4, 0x8912, &(0x7f0000000140)=@req={0x28, &(0x7f0000000100)={'veth1_virt_wifi\x00', @ifru_names='ip6_vti0\x00'}}) 16:35:55 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040006101a020200", 0x33a) 16:35:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2900}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r3, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x2c, r5, 0x1, 0x0, 0x0, {0xc}, [@ETHTOOL_A_STRSET_HEADER={0x4, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r8}}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x44, r5, 0x231, 0x70bd29, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x2000c881) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r9, r1, 0x0, 0x100000000) 16:35:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) [ 746.874441][ T9885] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 746.928778][ T9885] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 746.982198][ T27] audit: type=1804 audit(1594658156.024:1334): pid=9886 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/565/cgroup.controllers" dev="sda1" ino=16362 res=1 16:35:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2901}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:56 executing program 3: unshare(0x40000000) mmap(&(0x7f0000750000/0x1000)=nil, 0x1000, 0x1800008, 0x10, 0xffffffffffffffff, 0x6ac57000) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'macvlan0\x00'}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x19, &(0x7f0000000040)=0x4, 0x4) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x6) setsockopt(r1, 0x10e, 0xb, &(0x7f0000000240)="75cc11ec", 0x4) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="24000000200007041dfffd946f610500020000001f00000000000800057f000000000000", 0x24}], 0x1}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYRESHEX=r0], 0x20}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x90, r3, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x4}, @TIPC_NLA_MEDIA={0x5c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x803}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x948}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x1c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) r4 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bind$netlink(r4, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe}, 0xc) close(0xffffffffffffffff) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x4, 0x0, 0x0, 0x6, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) [ 747.146368][ T27] audit: type=1804 audit(1594658156.144:1335): pid=9894 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/517/cgroup.controllers" dev="sda1" ino=16373 res=1 [ 747.201811][ T9898] IPVS: ftp: loaded support on port[0] = 21 [ 747.286812][ T9898] lo speed is unknown, defaulting to 1000 [ 747.303962][ T9898] lo speed is unknown, defaulting to 1000 16:35:56 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9f", 0x9}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:56 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040007101a020200", 0x33a) 16:35:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2902}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x70bd2c, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYRESOCT=r1, @ANYRES16=r1, @ANYRESHEX=r1], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) 16:35:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="240000000706010400000000039fd7b65d98c68600ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) [ 747.473926][ T9922] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 747.491213][ T9922] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2903}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 747.527916][ T9898] IPVS: ftp: loaded support on port[0] = 21 16:35:56 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040008101a020200", 0x33a) [ 747.591720][ T9898] lo speed is unknown, defaulting to 1000 [ 747.622021][ T27] audit: type=1804 audit(1594658156.664:1336): pid=9934 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/518/cgroup.controllers" dev="sda1" ino=16376 res=1 [ 747.667330][ T9898] lo speed is unknown, defaulting to 1000 16:35:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2a00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x240, 0x14, 0x400, 0x70bd26, 0x25dfdbfd, {0x4, 0x7}, [@INET_DIAG_REQ_BYTECODE={0x81, 0x1, "5a64fd9ead9e2ee0a0940eeed177f871f265dd9ec2158c50b66fda1ba83ba6ebdb3ef321c24d91c0fac83eab5b46bfb4da8ec893b6459fbeb8951ade939d542f72ccb434128d84dc041f3bba6923ecb2972cf23e78ccf2b82235df0710eb328f5a7d67df43a6edf098a10b242665ffefa05ff653f906c73bc079f89cff"}, @INET_DIAG_REQ_BYTECODE={0xe, 0x1, "6a7144aac1cd77adf1ec"}, @INET_DIAG_REQ_BYTECODE={0xe3, 0x1, "e8a23d11ff5a65ba8f11557daae16e213303a03e945e153c8e781d4e8e046110f421902a1066601f6cc63d7f31004e0889f1138f5116b2d0b045a2a7ecb6662adfeb86cd3641baf1d004d6ff38bd36d1b17dc3c95ea8169d11ff96fd5a9642595ce9711cf4a6104659606a3cf163a072f7ec7ad895eab80ef3891ad273b690ecf5f03518a088535d313634070d5d443617047b9b055dc20acf9da740480e199ca93e3e7977ad67b30b0e83a5b02267fe9c663b4aa29f90fe1eee329e2f7b86bbb660ce9d7f605dd628f054f97c1809a7bfe383cf14516a6c6825c6a0b6bcb3"}, @INET_DIAG_REQ_BYTECODE={0x3f, 0x1, "d5521f5c9c680dd3729fd866124fd7113b6e949bc3d4b44a849ec84751af8f9ab5df824223bd15ac16c04ace9855b9e07a1e892b759fb2381dac2d"}, @INET_DIAG_REQ_BYTECODE={0x74, 0x1, "b5fd2c2b49b0b45f5f459c8f1ac9a575329efd3eb46449722d8dc5036f0c8abb9a1e00e3b32fa4b191bf6044be8af50a525669bb331d0938d9b1563f022976898e859b56f78523ace16360611b767f92c5a1062b5cf32b7345b1cc746a8c87a990a5080bbafd7467284f940acd112a8b"}]}, 0x240}, 0x1, 0x0, 0x0, 0x4000000}, 0x24000010) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="28000000040500079c1174fd80469b781d0854e86352a8a2a386b509a28bab4579"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) [ 747.729583][ T9950] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 747.741071][ T9950] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:56 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000200), 0x0) write$binfmt_elf64(r3, &(0x7f00000015c0)=ANY=[@ANYBLOB="8100635b36dd2f5e31032c05"], 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000002300)={0x0, 'bond0\x00'}) pipe(0x0) r4 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(r4, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={&(0x7f0000008f80)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000009180)={&(0x7f00000016c0)={0x44, 0x0, 0x8e6767b8eef245b5, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x20040004}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="416b19b751e163a3c1bbdfbc38e9aad740f262cfe46894350187ca18dd7d801efaa431eef300d53000608da7c5a40375246afda314c11f17e1eb1f74c39d37caa513a58ed26b2d379f36f01d64d29076", @ANYRES16=r5, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'macvlan1\x00'}) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 16:35:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2a01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:56 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04000a101a020200", 0x33a) [ 747.931837][ T27] audit: type=1804 audit(1594658156.974:1337): pid=9971 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/516/memory.events" dev="sda1" ino=16377 res=1 [ 748.005060][ T8802] tipc: TX() has been purged, node left! [ 748.029214][ T9978] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 748.046931][ T27] audit: type=1800 audit(1594658156.974:1338): pid=9971 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16377 res=0 [ 748.088421][ T9978] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 748.093582][ T27] audit: type=1804 audit(1594658156.974:1339): pid=9971 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/516/memory.events" dev="sda1" ino=16377 res=1 16:35:57 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b", 0xb}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) getpeername$l2tp(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) accept4$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000300)=0x1c, 0x80000) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000001c0)={r5}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400)={0x2, 0xeea, 0x0, 0x6, 0x8, 0x5, 0x7f, 0x7, r5}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000400)={r5}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={r5, 0x4, 0x10}, &(0x7f0000000200)=0xc) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000007119ff0ea45fb78e140000903ff0500010007"], 0x1}}, 0x20000841) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r1, 0x0, 0x100002000) 16:35:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2a02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:57 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04000b101a020200", 0x33a) 16:35:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) pwrite64(r0, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x44, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xffffffff}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x880}, 0x4045) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0xc7) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000004c0)={0x0, 0x1, 0x61bd, 0x1c2dc0000}) pwritev(r0, &(0x7f0000000280)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) write$cgroup_int(r0, &(0x7f0000000300), 0xfffffe8c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x3, 0x0, 0x73d1c06a, 0x47ff}) r2 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, 0x0, 0x0) listen(r2, 0x0) close(r2) getsockname$packet(r2, 0x0, 0x0) r3 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x0) getsockopt$PNPIPE_ENCAP(r3, 0x113, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) 16:35:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = gettid() r3 = getuid() r4 = getgid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32], 0x3c}, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x3c, 0x0, 0x0, 0xfffffffe, 0xfffffffe, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r1, 0x0, 0x100000000) 16:35:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2a03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 748.435108][ T9994] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 748.445682][ T9994] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:57 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04000c101a020200", 0x33a) 16:35:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2b00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 748.628622][T10004] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 748.713607][T10014] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 748.754352][T10014] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:35:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2b01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:57 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x20) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x2c, r1, 0x1, 0x0, 0x0, {0xc}, [@ETHTOOL_A_STRSET_HEADER={0x4, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r10, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff30000000000000000e1ff", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r10, @ANYBLOB="140012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="10002bbd7000ffdbdf250d0000000c00018008000100", @ANYRES32=r3, @ANYBLOB="200001801400020076657468305f766972745f776966690008000100", @ANYRES32=r6, @ANYBLOB="38000180080003000100000008000100", @ANYRES32=r10, @ANYBLOB="140002006970766c616e64510000000000000000080003000100000408000100", @ANYRES32=0x0, @ANYBLOB], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x48004) sendmmsg$inet6(r0, &(0x7f00000002c0)=[{{&(0x7f00000000c0)={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@rthdr={{0x28, 0x29, 0x5, {0x0, 0x2, 0x2, 0x1, 0x0, [@empty]}}}], 0x28}}], 0x1, 0x0) 16:35:57 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04000d101a020200", 0x33a) [ 749.037511][T10023] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 749.132454][T10024] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 749.189245][T10024] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 749.263031][T10034] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 16:35:58 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b", 0xb}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2b02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) socketpair(0x2a, 0x800, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff}) bind$rds(r3, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r4, 0x111, 0x3, 0x1, 0x4) 16:35:58 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04000e101a020200", 0x33a) [ 749.394299][T10034] bond39: (slave bridge24): making interface the new active one 16:35:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2b03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 749.435810][T10034] bond39: (slave bridge24): Enslaving as an active interface with an up link [ 749.471777][T10075] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 749.532617][T10034] bond40 (uninitialized): Released all slaves 16:35:58 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040010101a020200", 0x33a) 16:35:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2c00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:58 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x20) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x2c, r1, 0x1, 0x0, 0x0, {0xc}, [@ETHTOOL_A_STRSET_HEADER={0x4, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r10, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff30000000000000000e1ff", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r10, @ANYBLOB="140012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="10002bbd7000ffdbdf250d0000000c00018008000100", @ANYRES32=r3, @ANYBLOB="200001801400020076657468305f766972745f776966690008000100", @ANYRES32=r6, @ANYBLOB="38000180080003000100000008000100", @ANYRES32=r10, @ANYBLOB="140002006970766c616e64510000000000000000080003000100000408000100", @ANYRES32=0x0, @ANYBLOB], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x48004) sendmmsg$inet6(r0, &(0x7f00000002c0)=[{{&(0x7f00000000c0)={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@rthdr={{0x28, 0x29, 0x5, {0x0, 0x2, 0x2, 0x1, 0x0, [@empty]}}}], 0x28}}], 0x1, 0x0) 16:35:58 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040011101a020200", 0x33a) 16:35:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2c01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind(r2, &(0x7f0000000100)=@ipx={0x4, 0x1ff, 0xe63, "9956c394697f", 0x7}, 0x80) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100002000) [ 750.028388][T10097] bond40: (slave bridge25): making interface the new active one [ 750.050506][T10097] bond40: (slave bridge25): Enslaving as an active interface with an up link 16:35:59 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040012101a020200", 0x33a) 16:35:59 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b", 0xb}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:35:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2c02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:59 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040044101a020200", 0x33a) 16:35:59 executing program 3: socket$packet(0x11, 0xa, 0x300) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000200)='\n', 0xfffffdef, 0x40080, 0x0, 0x1f4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r3, 0x20, 0x70bd28, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x3, 0x800, @udp='udp:syz2\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x8000) 16:35:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2c03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:59 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c04005a101a020200", 0x33a) 16:35:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2d00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:59 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040069101a020200", 0x33a) 16:35:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2d01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:35:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00') sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r4 = socket$inet(0x2, 0x4, 0x2) sendfile(r3, r4, &(0x7f0000000200)=0x100000001, 0x7f) 16:35:59 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009021a020200", 0x33a) 16:36:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2d02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 750.996549][ T27] kauditd_printk_skb: 9 callbacks suppressed [ 750.996562][ T27] audit: type=1804 audit(1594658160.044:1349): pid=10173 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/522/cgroup.controllers" dev="sda1" ino=16377 res=1 16:36:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2d03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:00 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009031a020200", 0x33a) 16:36:00 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:00 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009041a020200", 0x33a) 16:36:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2e00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000040)={'netdevsim0\x00', {0x2, 0x4e20, @broadcast}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010003001404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="7000000030007b010000000000000000000000005c0001005800010008000100627066003000028018000200000000000000000000000000000000000000000008000500", @ANYRES32=r2, @ANYBLOB="0c0006002e2f66696c6530070000000000000000000c0008000000000000000000204fb36f1c44d72cdc674fe06c5f9a5c03c309527ff4ba3d353ea1e135df9a7fced335"], 0x33fe0}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r5, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_DEL_INTERFACE(r3, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x20, r6, 0x1, 0x70bd27, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0xf9da, 0x4}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x48000) [ 751.631689][T10199] validate_nla: 11 callbacks suppressed [ 751.631700][T10199] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 751.683654][T10199] __nla_validate_parse: 12 callbacks suppressed [ 751.683664][T10199] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2e01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 751.786377][T10204] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 16:36:00 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009051a020200", 0x33a) [ 751.838355][T10205] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:36:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2e02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 752.003949][T10204] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 752.041592][T10245] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:36:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvmsg$can_raw(r2, &(0x7f0000000640)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/97, 0x61}, {&(0x7f0000000340)=""/122, 0x7a}, {&(0x7f00000003c0)=""/248, 0xf8}, {&(0x7f00000004c0)=""/80, 0x50}], 0x4, &(0x7f0000000580)=""/163, 0xa3}, 0x0) clock_gettime(0x0, &(0x7f0000008740)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000008500)=[{{&(0x7f0000000680)=@in={0x2, 0x0, @private}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=""/176, 0xb0}, 0x8001}, {{&(0x7f0000001800)=@pptp, 0x80, &(0x7f0000001900)=[{&(0x7f0000001880)=""/21, 0x15}, {&(0x7f00000018c0)=""/3, 0x3}], 0x2, &(0x7f0000001940)}, 0x5}, {{&(0x7f0000001980)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001a00)=""/185, 0xb9}, {&(0x7f0000001ac0)=""/8, 0x8}, {&(0x7f0000001b00)=""/89, 0x59}, {&(0x7f0000001b80)=""/163, 0xa3}], 0x4, &(0x7f0000001c80)=""/216, 0xd8}, 0x81}, {{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000001d80)=""/4096, 0x1000}, {&(0x7f0000002d80)}, {&(0x7f0000002dc0)=""/11, 0xb}], 0x3, &(0x7f0000002e40)=""/4096, 0x1000}, 0x9}, {{&(0x7f0000003e40), 0x80, &(0x7f0000004040)=[{&(0x7f0000003ec0)=""/209, 0xd1}, {&(0x7f0000003fc0)=""/122, 0x7a}], 0x2, &(0x7f0000004080)=""/215, 0xd7}}, {{&(0x7f0000004180)=@isdn, 0x80, &(0x7f0000005700)=[{&(0x7f0000004200)=""/245, 0xf5}, {&(0x7f0000004300)=""/102, 0x66}, {&(0x7f0000004380)=""/117, 0x75}, {&(0x7f0000004400)=""/236, 0xec}, {&(0x7f0000004500)=""/4096, 0x1000}, {&(0x7f0000005500)=""/1, 0x1}, {&(0x7f0000005540)=""/144, 0x90}, {&(0x7f0000005600)=""/29, 0x1d}, {&(0x7f0000005640)=""/145, 0x91}], 0x9, &(0x7f00000057c0)=""/135, 0x87}, 0x1}, {{&(0x7f0000005880)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005900)=""/192, 0xc0}, {&(0x7f00000059c0)=""/175, 0xaf}, {&(0x7f0000005a80)=""/72, 0x48}, {&(0x7f0000005b00)=""/208, 0xd0}, {&(0x7f0000005c00)=""/55, 0x37}, {&(0x7f0000005c40)=""/253, 0xfd}, {&(0x7f0000005d40)=""/142, 0x8e}, {&(0x7f0000005e00)=""/72, 0x48}, {&(0x7f0000005e80)=""/110, 0x6e}], 0x9, &(0x7f0000005fc0)=""/120, 0x78}, 0x93}, {{0x0, 0x0, &(0x7f0000007200)=[{&(0x7f0000006040)=""/235, 0xeb}, {&(0x7f0000006140)=""/4096, 0x1000}, {&(0x7f0000007140)=""/18, 0x12}, {&(0x7f0000007180)=""/104, 0x68}], 0x4, &(0x7f0000007240)=""/72, 0x48}, 0x2}, {{&(0x7f00000072c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000008440)=[{&(0x7f0000007340)=""/225, 0xe1}, {&(0x7f0000007440)=""/4096, 0x1000}], 0x2, &(0x7f0000008480)=""/105, 0x69}, 0x8}], 0x9, 0x122, &(0x7f0000008780)={r3, r4+10000000}) sendmsg$IPSET_CMD_LIST(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x20000800}, 0x40810) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r0, r1, 0x0, 0x7ff) r6 = socket(0x10, 0x803, 0x0) r7 = accept$inet(r6, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000001940)=0x10) ioctl$sock_inet_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000002d80)={'wg0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$EBT_SO_GET_INFO(r6, 0x0, 0x80, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x78) [ 752.062854][T10245] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:01 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) [ 752.129583][T10202] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:36:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2e03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:01 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009061a020200", 0x33a) 16:36:01 executing program 3: unshare(0x40000000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x15}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="200000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="6535020000000020"], 0x20}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000040)=0x4) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYRES16, @ANYRES16=r5, @ANYBLOB="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"], 0x58}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r5, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40084) syz_genetlink_get_family_id$devlink(0x0) syz_genetlink_get_family_id$ethtool(0x0) [ 752.303272][ T27] audit: type=1804 audit(1594658161.345:1350): pid=10253 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/523/cgroup.controllers" dev="sda1" ino=16376 res=1 16:36:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2f00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 752.354478][T10260] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:36:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x7, 0x1, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) ioctl$FICLONERANGE(r1, 0x4020940d, 0xfffffffffffffffe) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_LIST(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES64=r4], 0x1}, 0x1, 0x0, 0x0, 0x20810}, 0x2000c048) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r3, 0x0, 0x100002000) [ 752.407147][T10260] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 752.431554][T10263] IPVS: ftp: loaded support on port[0] = 21 [ 752.516882][T10263] lo speed is unknown, defaulting to 1000 16:36:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2f01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:01 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009071a020200", 0x33a) [ 752.559843][T10263] lo speed is unknown, defaulting to 1000 [ 752.683152][ T27] audit: type=1804 audit(1594658161.725:1351): pid=10276 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/524/cgroup.controllers" dev="sda1" ino=16368 res=1 16:36:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2f02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 752.739571][T10288] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 752.759551][T10288] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:01 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009081a020200", 0x33a) 16:36:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2f03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 752.888134][T10263] IPVS: ftp: loaded support on port[0] = 21 [ 752.984088][T10263] lo speed is unknown, defaulting to 1000 [ 753.016234][T10263] lo speed is unknown, defaulting to 1000 [ 753.042332][T10317] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:36:02 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) [ 753.100455][T10317] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100002000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="58000000020601000000000000000000000000000900020073797a320000000014000300686173683a69702c706f72742c6970000c000780080012409effffff0500010007000000050004fed63377000500050002000000"], 0x58}}, 0x0) ioctl$FIONCLEX(r2, 0x5450) 16:36:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3000}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:02 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009091a020200", 0x33a) 16:36:02 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)) r1 = socket$nl_route(0x10, 0x3, 0x0) connect$x25(0xffffffffffffffff, &(0x7f0000000340)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_SB_GET(r5, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r6, 0x400, 0x70bd26, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x9}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r4, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff30000000000000000e1ff", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="140012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8003, 0x1000}, [@IFLA_GROUP={0x8, 0x1b, 0x80000000}]}, 0x28}}, 0x4) 16:36:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3001}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 753.357123][T10348] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 753.435224][T10348] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x18, 0x1412, 0x300, 0x70bd2d, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x20040050}, 0x4c010) sendfile(r2, r1, 0x0, 0x100002000) 16:36:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3002}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:02 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c0400090a1a020200", 0x33a) [ 753.545300][T10357] IPVS: ftp: loaded support on port[0] = 21 16:36:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x4000000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effff3f}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000200)={{0x1, 0x0, @identifier="6d9e4bef612b9378df51ffacc8b34c7d"}, 0x7c, 0x0, [], "a83561c7427dc2a19a16bb5c6025e84e67c45390b69d90a1100fe2546c00afbfb0ae99624c4289135e6bf929efc7feb881e10ec7eb343412c719f0aec54e7ed5baf9b5626129333d92509b72032764d76923b19aca1d8f6c0520959af0fe23bbb8186e0ee1ac1eeb25bd2c1205259bf9ab3a74fe21153bc158b33de9"}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x5, 0x0, @descriptor="73257a8ccf8d751f"}, 0x7f, r4, [], "b32697a92cf2ccb120995ca9a4ec97a1254881b22e03383ed90c67177699d28b1bbe3206c3ff249f2c53afe4c8418a71346e182b6403bc6ce7e5bf41b36b6a35d7301966e0e5b2721c1d088c0787d8354f6b580f1f2e9ad1864cb28061c141290281663df7a14c312e45bb4f793d0558529e323f1e48aba648a0fde34c11e1"}) sendfile(r2, r1, 0x0, 0x100000000) [ 753.656548][T10357] lo speed is unknown, defaulting to 1000 [ 753.670295][T10366] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 753.708738][ T27] audit: type=1804 audit(1594658162.755:1352): pid=10361 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/526/cgroup.controllers" dev="sda1" ino=16374 res=1 16:36:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3003}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 753.752035][T10366] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 753.835260][T10357] lo speed is unknown, defaulting to 1000 [ 753.875710][ T27] audit: type=1804 audit(1594658162.925:1353): pid=10370 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/569/cgroup.controllers" dev="sda1" ino=16379 res=1 [ 753.908736][T10370] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 16:36:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3100}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 753.928416][T10370] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:36:03 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:03 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c0400090b1a020200", 0x33a) 16:36:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3101}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0xffffe000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) [ 754.461257][T10358] bond0: (slave bridge0): making interface the new active one [ 754.507180][ T8802] tipc: TX() has been purged, node left! [ 754.532447][ T8802] tipc: TX() has been purged, node left! [ 754.546576][T10358] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 754.566078][T10357] IPVS: ftp: loaded support on port[0] = 21 [ 754.605027][ T8802] tipc: TX() has been purged, node left! [ 754.624298][T10357] lo speed is unknown, defaulting to 1000 [ 754.642229][T10357] lo speed is unknown, defaulting to 1000 [ 754.963841][T10472] bond42: (slave bridge26): making interface the new active one [ 754.978179][T10472] bond42: (slave bridge26): Enslaving as an active interface with an up link 16:36:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05140000000000000000010000000900010073797a300000000014000000020a050000000000000000000000000020000000020a05000000000000000000010000000900010073797a3000000000140000001100010000000000000000000000000aea65c38b7ff0052993e09a8037c487ab810c7ecb53"], 0x7c}, 0x1, 0x0, 0x0, 0x84}, 0x0) 16:36:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r4 = accept4(r3, 0x0, &(0x7f0000000280), 0x80000) sendmsg$IPSET_CMD_FLUSH(r4, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x48000}, 0x4000841) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r1, 0x0, 0x100000000) 16:36:04 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c0400090c1a020200", 0x33a) 16:36:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3102}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) mmap(&(0x7f00008e5000/0x3000)=nil, 0x3000, 0x2, 0x28011, 0xffffffffffffffff, 0x44828000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002000) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000300)=0x1c, 0x80000) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x71, &(0x7f00000001c0)={r6}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400)={0x2, 0xeea, 0x0, 0x6, 0x8, 0x5, 0x7f, 0x7, r6}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400)={r6}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x4, 0x0, 0x8004, 0x254a, 0x8, 0x1ff, 0x7, 0x1, r6}, 0x20) 16:36:04 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:04 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c0400090d1a020200", 0x33a) 16:36:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3103}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 755.191565][ T27] audit: type=1804 audit(1594658164.235:1354): pid=10515 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/570/cgroup.controllers" dev="sda1" ino=16373 res=1 16:36:04 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f0000000080), &(0x7f0000000180)=0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x3) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000040)='wg0\x00', 0x4) shutdown(r2, 0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, 0x9c) 16:36:04 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c0400090e1a020200", 0x33a) 16:36:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3200}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x8) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x2}, 0x369) sendmmsg$alg(r2, &(0x7f0000002b00)=[{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000180)="99", 0x1}], 0x1}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x0, 0x20}, 0x8) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000000200)={0x8000, {{0x2, 0x4e22, @empty}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}}}, 0x108) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x411, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 16:36:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3201}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) write$binfmt_script(r2, &(0x7f00000003c0)={'#! ', './file0', [{0x20, 'cgroup.controllers\x00'}, {0x20, 'cgroup.controllers\x00'}], 0xa, "2b8dc54d7bab44bdbd9da940d25befbd2acc57811e7b3240a9b6509d2d9cb7a9e1b4464a1056d8334f54b962a0c46e4ff9407db8d3a932c958ecd4fc16984cd6725172f8fa638bd2f126914e60bb7c5cbdd776907df416092da9c0d6e57b7368bb841607f21749999f54e390a0cb15efa68684f36aadb8dd538de2444466f552165d02577630358caecb99bfdb941855113711"}, 0xc6) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) recvfrom$rxrpc(r0, &(0x7f0000000200)=""/143, 0x8f, 0x1, &(0x7f0000000040)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e21, @private=0xa010101}}, 0x24) sendfile(r3, r1, 0x0, 0x100000000) 16:36:04 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009111a020200", 0x33a) 16:36:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3202}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 755.932460][ T27] audit: type=1804 audit(1594658164.975:1355): pid=10557 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/571/cgroup.controllers" dev="sda1" ino=16384 res=1 [ 756.059027][ T27] audit: type=1804 audit(1594658165.105:1356): pid=10518 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/528/cgroup.controllers" dev="sda1" ino=16379 res=1 [ 756.096262][ T27] audit: type=1804 audit(1594658165.105:1357): pid=10523 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/528/cgroup.controllers" dev="sda1" ino=16379 res=1 16:36:05 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:05 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009121a020200", 0x33a) 16:36:05 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=ANY=[@ANYBLOB="840700002c00270d0000000000000000000000008dedec9ed9ae7c1d0e118f32b9b967fd52e960d5334843066f470ace27dca2c120d1b1c0f94a4da30c947e124d3811d430e14e0bc9f17756769d61d8bb5660c0dccbbe0b9674e900bdd0aa095bf798d6117ad08b5d36aced12", @ANYRES32=r3, @ANYBLOB="00001000000000000e0000000b0001006367726f757000001c010200180103800c010280180001000000010000000000000000000000000000000000f0000200b4c909006300000008000100000000000800010002000000050003000300000005000400030000000b000200706f6c6963790000a4000500b28c9f603fca6293d05876ee4e621f570680ab70036581b12470a75bd1983d128099487acdd5c722e0e5b37d9435dcdb2a40c626da718db72016133fb71298e88c21fb9217819233101f89ff8957d6767b5fd56695384bbab657dc09bbe7eab1b46a9cb86e48927dc1b25261e44ae8868920c620e8a7e1dd1147b99dab5f306fb720da9f895b429404a15009677b794efabe40dcce366ef073658d207e957afb05000400000000000b000200706f6c6963790000080001001f000000"], 0x14c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 16:36:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3203}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 756.382197][ T27] audit: type=1804 audit(1594658165.425:1358): pid=10586 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/528/cgroup.controllers" dev="sda1" ino=16379 res=1 16:36:05 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000440)={0x1, 'macvlan1\x00', {}, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) sendmsg$tipc(r2, &(0x7f0000000340)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x3, {0x4e20, 0x3}}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000180)="4305eb9ce2406507f9a2940f7ed1c3db4933b36859db6f1b967a7c8a16a261487632c290f6f72b9c83c49e7eceb48d581b15156c", 0x34}, {&(0x7f0000000200)="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", 0xfc}], 0x2, &(0x7f00000003c0)="3fd83f54cc274de3a81e808c5a6332e0c4085ab1b502e6a0c977c9a2db9b36ca9fa4b7a12bc94fdaf644e048a2ea13ac5c498340ff5ee32b02bea081230809fa191be6873bdeea77", 0x48}, 0x40800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000000) 16:36:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000500) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x4e22, 0xffffffff, @private2={0xfc, 0x2, [], 0x1}, 0x2e4}}, 0x0, 0x0, 0x25, 0x0, "ba5192ad39a8ea70897f3758730c60905a7ddd0e56b6ccd9ab4412a02f041ea060877598a34e3027e9321793db7fffe51973f334da513b02abea8b1c82350e99e8b09ddacfda32ba322402c86e6d2410"}, 0xd8) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r7, r5, 0x0, 0x100002000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000340)=0x5, 0x4) 16:36:05 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c0400092f1a020200", 0x33a) 16:36:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3300}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:05 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0xffa1) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000180)=0x80, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='batadv_slave_0\x00', 0x10) ioctl$int_in(r2, 0x5421, &(0x7f00000007c0)=0x1) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @private=0xa010100}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf3, 0x21f4}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffd83) splice(r0, 0x0, r3, 0x0, 0x10003, 0x0) vmsplice(r1, &(0x7f0000000740)=[{&(0x7f0000000800)='&', 0x1}, {0x0}], 0x2, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="840cc2e6fcf0856ddf25040000000c000180080005000400000034000280080007000300000008000300020000220800070006830000060002004e22000008000008000500ffffff7f080006000200"/94], 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x0) [ 756.647605][ T27] audit: type=1804 audit(1594658165.695:1359): pid=10647 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/572/cgroup.controllers" dev="sda1" ino=16367 res=1 [ 756.678536][T10647] validate_nla: 9 callbacks suppressed [ 756.678545][T10647] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 16:36:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) bind$qrtr(r0, &(0x7f00000002c0)={0x2a, 0xffffffff, 0x4000}, 0xc) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x2c, r5, 0x1, 0x0, 0x0, {0xc}, [@ETHTOOL_A_STRSET_HEADER={0x4, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)={0x0, 0x100000000, 0x1}) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x3c, r6, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004041}, 0x4008000) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10011000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x90, r6, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:user_cron_spool_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'gre0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'gretap0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}]}, 0x90}, 0x1, 0x0, 0x0, 0x48000}, 0x24000800) sendfile(r2, r1, 0x0, 0x100002000) [ 756.738880][T10657] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 756.741496][T10647] __nla_validate_parse: 11 callbacks suppressed [ 756.741503][T10647] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 756.768525][T10657] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3301}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:05 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009441a020200", 0x33a) [ 756.952501][ T27] audit: type=1804 audit(1594658165.995:1360): pid=10667 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/530/cgroup.controllers" dev="sda1" ino=16363 res=1 [ 756.959387][T10668] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 756.999115][T10668] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:06 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket(0x4, 0x6, 0x90e8) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000580)=0x800, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000004500004c0000000c001d8005000100aa000000"], 0x20}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x20, r6, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @link_local}]}, 0x20}, 0x1, 0x0, 0x0, 0x4800}, 0x40000) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r8 = socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x3}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000010000108000000000000009af7bfb749f12af9a40000000000c34ea835645264b1c0f464813175ce15195522482f88f4100f21b202078572b4595e70b44887c6c6b5bc21716f24552f91e4d40447780009298b26da0b621f5bf2eda1c79d4237febf18f2860b20f2d3226bd2eeaa8ab6", @ANYRES32=r3, @ANYBLOB="000000000000000005002700090000001d90cde97cab095b52bacbdf4f6520f3a3175f7b0940eb6101aca922a34448aea44b6e12c76d5fe7aea45a1dcd027ddcd22c778b9d53889e03112decd5e07ce48604f16ed829c7bee70300110625ddd5372f6d7c695ef0298a246346463f9844dcdb8e305a13e157"], 0x28}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001740)=0x14) sendmsg$ETHTOOL_MSG_PAUSE_GET(r8, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10200040}, 0xc, &(0x7f0000001800)={&(0x7f0000001780)={0x74, 0x0, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x24000804}, 0x4) 16:36:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3302}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:06 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c0400095a1a020200", 0x33a) 16:36:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000040)) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r3, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="280000000406bd52687f82343e01"], 0x1}}, 0xc0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000000) getpeername(r1, &(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) accept$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) 16:36:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000000)={'bridge_slave_1\x00', {0x2, 0x4e24, @multicast1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) accept$packet(r3, &(0x7f0000000140), &(0x7f0000000240)=0x14) getsockname$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x4000084) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r5, 0x0, 0x100002000) [ 757.412928][T10681] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:36:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3303}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 757.458124][T10681] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 757.501302][T10689] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 757.518002][ T27] audit: type=1804 audit(1594658166.565:1361): pid=10685 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/573/cgroup.controllers" dev="sda1" ino=16381 res=1 16:36:06 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009691a020200", 0x33a) 16:36:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3400}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 757.678288][ T27] audit: type=1804 audit(1594658166.715:1362): pid=10702 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/531/cgroup.controllers" dev="sda1" ino=16375 res=1 [ 757.703393][T10699] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 757.757929][T10689] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 757.786962][T10699] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 757.846401][T10707] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:36:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x30, r1, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}]}, 0x30}}, 0x44040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000000) 16:36:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3401}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 757.892697][T10707] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:07 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c0400091003000200", 0x33a) [ 758.151400][T10716] netlink: 794 bytes leftover after parsing attributes in process `syz-executor.2'. [ 758.168633][ T27] audit: type=1804 audit(1594658167.215:1363): pid=10714 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/574/cgroup.controllers" dev="sda1" ino=16363 res=1 [ 758.198891][T10714] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 758.215963][T10714] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:36:07 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0)=0x1, 0x4) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000180)) socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005940)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}], 0x2, 0x91) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$sock(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="f1e2da19b8d4b58a6fa5292369b62b1c7ce88a22f86cf30db53a19f64c9b28070b1346c92f8561d0723f8a39cce9e10c770fe26a49ae01c4e14b0a7bc1b777393ffb0c", 0x43}, {&(0x7f00000001c0)="496ef648a33d098970116870b7e7c190f1cd747cb957beccda5e2860d6bfbc31618ace64c28e18f150867f76c4cd064677c9e1916b35c6d19aa382a2fd3cccaf7ca21ce6ce98e1440357177abd6209c4487e4b6156ad129fa8268786a1bd9939247dd7a12a11acd670dd90222ecec1177d83e8c0899b40e0d8f7c9676c9d2178095c7633b7788da84509e034f4e26a7c6fb38cc8a70309", 0x97}, {&(0x7f0000000300)="b30c3af948af8555ce19db3da2b24d5d5dc19785b83c292fdcde1aa648483595b68c10551ca5d20786f2594fe56a7cfc638763670a1ea0d143c570c65f464013b2a0e4135af2350e01e6b28af7705b234b6aaa51bdfa4f6e6f49c9d87b2995bc8c4717f57a3db23f4dcb924d806d9dbd1636da6308641a78778a00c0cdd772ecbd71cc09a28c704032956f5c6e1d48e39e14c2d86c665304ce161267da860417f4df5d7272606444cb5e6d3e613d5d38f70b40014ef99c528299ca549cd2b3dc80df38a5ed91d54fa429368ddc801b128578b02ce1fc806bbc70e607", 0xdc}], 0x3}, 0x1011) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d435590043e1000000e9000500010007"], 0x1}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000001) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x64, r5, 0x536ae464467e3e0b, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x64}}, 0x0) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)={0x34, r5, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000004}, 0x4008001) 16:36:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3402}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:07 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c0400091044020200", 0x33a) [ 758.446563][T10728] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:36:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3403}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 758.487869][T10728] netlink: 214 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:07 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009105a020200", 0x33a) 16:36:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) getpeername$l2tp(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10) accept4$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000300)=0x1c, 0x80000) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={r4}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400)={0x2, 0xeea, 0x0, 0x6, 0x8, 0x5, 0x7f, 0x7, r5}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000400)={r5}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r5, 0x9}, &(0x7f0000000140)=0x8) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r1, 0x0, 0x100002000) 16:36:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3500}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) sendfile(r2, r1, 0x0, 0x100000000) [ 758.772605][T10744] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 16:36:07 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c0400091069020200", 0x33a) [ 758.865917][ T27] audit: type=1804 audit(1594658167.915:1364): pid=10743 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/532/cgroup.controllers" dev="sda1" ino=16363 res=1 16:36:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3501}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 759.037272][ T27] audit: type=1804 audit(1594658168.085:1365): pid=10750 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/575/cgroup.controllers" dev="sda1" ino=16369 res=1 16:36:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3502}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:08 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:08 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x9c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0902fdffffff000000000100000006000a004e220000140007000000000000000000000000000000000108000b00", @ANYRES32=0x0, @ANYBLOB="be44a47ff5b75c3d30aeddcb97c8f5a30985bed9ebe69d1af2ac6d9de19ed1accf6326009fed8cfc6d6cde4acde83269a55a5f85569e8886ae1227c5348a832b94af649c4b01be42c1f32d014d659df57f34cdf9cfc708e6eefeb6f6ee7445e4f58a38807dd51c800393fd954ef8734dcaaa4784d0879ec5ccf7d5951a8eb4e4eeda32ca783bb84401172dca4af62db792c4811c50c8f0781415be3e26d874fa6f13cdee25d09c75ca22a266b4e068fa79f87e3e2669c55b6cfc0b5e27533d713f09d97407ba50964827a8dc826eb7db457c28f2b2d0acb745ccac63ff21c138f63569"], 0x38}}, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000100), 0x8) listen(0xffffffffffffffff, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[], 0x80}}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', r5}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5f0660a11850283821954a58ca3606000000000000001f634f", @ANYRES16=0x0, @ANYBLOB="100029bd7000fbdbdf2d02000000060001154e24000014020900200100"/42], 0x30}, 0x1, 0x0, 0x0, 0x24000040}, 0x4000000) 16:36:08 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a030200", 0x33a) 16:36:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$RDMA_NLDEV_CMD_GET(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xfdbde9878882b382}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="48000000011420002bbd7000ffdbdf25080001000100000008000100010000000800010001000000384151f802000000080001000000000008000100010000000800010001000000"], 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x40) 16:36:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3503}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r3, @ANYBLOB="00000000e60000001c00120008000000626f0000000c0002000800010006"], 0x3c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x30, r5, 0x1, 0x0, 0x0, {{}, {}, {0xa, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x24, r5, 0x200, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x12000}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x24008000) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xe, 0x4010, r0, 0x83a10000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000240)='erspan0\x00') r7 = socket$inet_sctp(0x2, 0x1, 0x84) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r6, 0x0, 0x100000000) ioctl$FICLONE(r7, 0x40049409, 0xffffffffffffffff) 16:36:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3600}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:08 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a030200", 0x33a) 16:36:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3601}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:09 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a070200", 0x33a) 16:36:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3602}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_LIST(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}, 0x1, 0x0, 0x0, 0x24000040}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100002000) 16:36:09 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:09 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:09 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a090200", 0x33a) 16:36:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3603}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:09 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3700}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:10 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:10 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a0a0200", 0x33a) 16:36:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x53, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c000000f42441566af1aa1b5e127a8bdf54a5735b5bbb", @ANYRES16=0x0, @ANYBLOB="00000000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB], 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r1, 0x0, 0x37) 16:36:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x3, 0x3, 0x801, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x7ff}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x10000}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff, 0x36}}]}, 0x30}}, 0x20000005) 16:36:10 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, 0x0, 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3701}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:10 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a0f0200", 0x33a) [ 761.138744][ T27] kauditd_printk_skb: 8 callbacks suppressed [ 761.138757][ T27] audit: type=1804 audit(1594658170.185:1374): pid=10838 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/577/cgroup.controllers" dev="sda1" ino=16364 res=1 [ 761.273294][ T27] audit: type=1804 audit(1594658170.315:1375): pid=10844 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/535/cgroup.controllers" dev="sda1" ino=16363 res=1 16:36:10 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a0a0200", 0x33a) 16:36:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3702}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:10 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, 0x0, 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) write$binfmt_script(r2, &(0x7f0000000200)={'#! ', './file0', [{}], 0xa, "1d4f758016eb4c3806d75618839c9bc8140c42190f44fcaa787aa698677c249bf95305f8f00f03f42da44cbeb52bf558724767d67384d180368fc7ccfebb100b7546f403eedf1a669f17b003bb9e5c82d898402fe39861f1a66ab0099714fafd94100a173e27f36ad460d529cfae8ac374d360b70506318cf2bc73e85e9183ea6a605c44dc89c9d04556e901040ff7e37c745123864a4d3b01763a8376780226bd72acec2824415b856364b57f89ef7e5c"}, 0xbd) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) 16:36:10 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a1e0200", 0x33a) 16:36:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000300)=0x1c, 0x80000) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001740)) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r4}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400)={0x2, 0xeea, 0x0, 0x6, 0x8, 0x5, 0x7f, 0x7, r4}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400)={r4}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={r4, @in={{0x2, 0x4e24, @local}}, 0x1000, 0x7}, 0x90) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='freezer.state\x00', 0x2, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef0000000903ff0500010007"], 0x1}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100002000) 16:36:10 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, 0x0, 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:36:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3703}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:10 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet(0x10, 0x80000, 0xffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @private2}}, 0x5c) ioctl$sock_ifreq(r0, 0x8925, &(0x7f0000000180)={'veth0_to_bond\x00', @ifru_flags}) [ 761.737842][ T27] audit: type=1804 audit(1594658170.785:1376): pid=10862 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/578/cgroup.controllers" dev="sda1" ino=16381 res=1 16:36:10 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a440200", 0x33a) [ 761.784294][T10862] validate_nla: 4 callbacks suppressed [ 761.784303][T10862] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 761.834436][T10862] __nla_validate_parse: 10 callbacks suppressed [ 761.834444][T10862] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:36:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@null) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.swap.current\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x82051, r2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)) r3 = openat$cgroup_ro(r2, &(0x7f0000000140)='cpuset.effective_mems\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040200000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100002000) [ 761.872119][ T27] audit: type=1804 audit(1594658170.785:1377): pid=10870 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/536/cgroup.controllers" dev="sda1" ino=16384 res=1 [ 761.920630][T10880] IPVS: ftp: loaded support on port[0] = 21 [ 761.926796][T10881] netlink: 794 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3800}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:11 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r1) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffdc, 0x0) 16:36:11 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a5a0200", 0x33a) [ 762.015843][T10880] lo speed is unknown, defaulting to 1000 [ 762.060626][T10880] lo speed is unknown, defaulting to 1000 16:36:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x80, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10000}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2e}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4b}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2b}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x801}, 0x24082845) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000300)=0x1c, 0x80000) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={r5}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400)={0x2, 0xeea, 0x0, 0x6, 0x8, 0x5, 0x7f, 0x7, r5}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400)={r5}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000200)={r5, 0x4fb}, 0x8) sendfile(r3, r2, 0x0, 0x100002000) [ 762.138108][ T8802] tipc: TX() has been purged, node left! [ 762.145410][ T8802] tipc: TX() has been purged, node left! [ 762.213431][T10898] netlink: 794 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$isdn_base(0x22, 0x3, 0x0) write$binfmt_elf64(r2, &(0x7f0000000840)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x8, 0x2, 0xff, 0x20, 0x2, 0x6, 0x4, 0x132, 0x40, 0x32f, 0x8001, 0x20, 0x38, 0x2, 0x9, 0x4, 0xca72}, [{0x6, 0x0, 0x80, 0x3, 0x1, 0x280000000000000, 0x5437, 0x7ff}], "14b1ad3e38e698f92cac25f99e4374469511ae68c5ce8af5100802a4eef1081bce93467dfe358328c86c652c322432248585193f69113c20b8561be692ea8ea0c053280dd356caddd62ee091abb2bc93f5647fa12f005c687d745ed40fc4218870a85312bc168ad1e074ea2ea2f86d0871a0f46427627a5794224c2e78f99840f47a081965c4f049a32c26849cdc37a966d5eb20de1402a0870ae091fcfe6d6b1c9ffeb68c17b5db3c41edfe9d44c405035277d891b2fa32e21958cea15d9f349b6ad11ff2b681427bf4281ec35ae5bd4bca5d178d6392b70633184d246ad5b900fb14462cc3eb3787853a776a849bbc3d38b4041551c25e", [[], [], [], [], [], []]}, 0x770) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) 16:36:11 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a630200", 0x33a) 16:36:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3801}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 762.399310][T10924] netlink: 794 bytes leftover after parsing attributes in process `syz-executor.2'. [ 762.426933][ T27] audit: type=1804 audit(1594658171.475:1378): pid=10916 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/538/cgroup.controllers" dev="sda1" ino=16368 res=1 16:36:11 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a690200", 0x33a) 16:36:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3802}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 762.529435][T10926] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 762.544427][T10880] IPVS: ftp: loaded support on port[0] = 21 [ 762.559388][T10926] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 762.569167][ T27] audit: type=1804 audit(1594658171.565:1379): pid=10926 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/579/cgroup.controllers" dev="sda1" ino=16382 res=1 [ 762.631668][T10932] netlink: 794 bytes leftover after parsing attributes in process `syz-executor.2'. [ 763.200759][ T8802] bond0 (unregistering): (slave bridge0): Releasing active interface [ 763.347387][ T8802] bond0 (unregistering): Released all slaves 16:36:13 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000300)=0x1c, 0x80000) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={r3}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400)={0x2, 0xeea, 0x0, 0x6, 0x8, 0x5, 0x7f, 0x7, r3}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400)={r3}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000140)={r3, 0x4, 0x6}, 0x8) r4 = accept4$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000100)=0x10000, 0x4) ioctl$FIBMAP(r0, 0x5460, &(0x7f00000002c0)) 16:36:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3803}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:13 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020300", 0x33a) 16:36:13 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r1) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffdc, 0x0) 16:36:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0xfffffffffffffffc) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) 16:36:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) write$binfmt_script(r0, &(0x7f0000000600)=ANY=[@ANYRES32=r1, @ANYBLOB="d54fe4c9ddb7332260b2bb04d6c2a912fa61ca6701b08db456708caccbf33a83858e01783f5cf4e82d42ca9054781b7e217f25c6d63e8dc787d28cc5a7e45a8776a16fb0b670c740fba4d8c0e6ae48684aa6aff991e874a74c5b7c4d681b38445a3f076178308487c3f80af3724321c8fd2c15e3d6c30537791d2f3d1691d90a03fa2109d81af34405a149c8cab84b45d2ebd584767c1b2ca1c750ebecea3b803f39e638c187948f93917a451dfe253d7c1a68acdcfd1e3b382dd433bf8339e5", @ANYBLOB="b7596b6b8399e005673be4027641b9b050111744f728d76295b5d72725c2de23b8fd210644a7238920b0ec", @ANYRESHEX=r2, @ANYRES32=r3, @ANYRESOCT=r3], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$phonet(r5, &(0x7f0000000840)=""/4096, 0x1000, 0x40000000, &(0x7f0000000040)={0x23, 0x1, 0x5, 0x2}, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r4, 0x0, 0x100000000) [ 764.574883][T10952] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 16:36:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3900}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 764.615788][T10952] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x80000, 0x1) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x64, r5, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc}]}, 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r7, 0x0, 0x100000500) ioctl$PPPIOCGNPMODE(r7, 0xc008744c, &(0x7f0000000380)={0x57, 0x3}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="008a000000070000"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="6000000010001fff00"/20, @ANYRES32=r6, @ANYBLOB="00000000000000002000128008000100677470001400028008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB], 0x40}}, 0x0) [ 764.662199][ T27] audit: type=1804 audit(1594658173.705:1380): pid=10953 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/580/cgroup.controllers" dev="sda1" ino=16363 res=1 [ 764.698840][T10953] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 16:36:13 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020700", 0x33a) [ 764.756291][T10953] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 764.821874][ T27] audit: type=1804 audit(1594658173.735:1381): pid=10951 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/539/cgroup.controllers" dev="sda1" ino=16364 res=1 16:36:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3901}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 764.897156][T10971] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3902}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:14 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020900", 0x33a) 16:36:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff30000000000000000e1ff", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32, @ANYBLOB="140012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0x64, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x3}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @link_local}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @remote}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0xffffffffffffffff}}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x4800c) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r5}}, 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', r5}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r9, @ANYBLOB="00000000000000001c0012000b0001006272696467658c5c4de5c579600377d964"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r9], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x20000000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) [ 765.164931][T10984] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) connect$ax25(r1, &(0x7f0000000100)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}, 0x1, 0x0, 0x0, 0x4010}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100002000) 16:36:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3903}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 765.276276][T10989] device bridge_slave_0 left promiscuous mode 16:36:14 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r1) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffdc, 0x0) 16:36:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) pread64(r1, &(0x7f0000000200)=""/87, 0x57, 0x1ff) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000000) 16:36:14 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020a00", 0x33a) [ 765.332351][T10989] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3a00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:14 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020f00", 0x33a) 16:36:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f0000000200)={0x1, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x37}}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002000) [ 765.578953][ T27] audit: type=1804 audit(1594658174.625:1382): pid=11003 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/581/cgroup.controllers" dev="sda1" ino=16380 res=1 16:36:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x4, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@ldst={0x0, 0x2, 0x2, 0x1, 0x1, 0xffffffffffffffff, 0x10}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @map], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf8, 0x10, 0x0}, 0x70) 16:36:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3a01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 765.632537][T11003] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 765.698691][T11013] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 16:36:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3a02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x4, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@ldst={0x0, 0x2, 0x2, 0x1, 0x1, 0xffffffffffffffff, 0x10}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @map], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf8, 0x10, 0x0}, 0x70) 16:36:14 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a021e00", 0x33a) [ 765.814735][ T27] audit: type=1804 audit(1594658174.865:1383): pid=11015 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/541/cgroup.controllers" dev="sda1" ino=16384 res=1 16:36:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3a03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:15 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffdc, 0x0) 16:36:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000580)={'wg1\x00', 0x0}) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)=@mpls_newroute={0x54, 0x18, 0x8, 0x70bd25, 0x25dfdbfc, {0x1c, 0x14, 0x0, 0x6, 0xfe, 0x3, 0xfd, 0x0, 0x400}, [@RTA_MULTIPATH={0xc, 0x9, {0x3, 0xe0, 0x0, r9}}, @RTA_OIF={0x8, 0x4, r11}, @RTA_VIA={0x14, 0x12, {0x8, "6ad1be02bb6896d19f2710a9c983"}}, @RTA_DST={0x8, 0x1, {0x2, 0x0, 0x1}}, @RTA_DST={0x8, 0x1, {0x3}}]}, 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x8001) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x6558, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x425, 0x0, 0x0, {0x10, 0x0, 0xc, r8}}, 0x20}}, 0x0) ioctl$sock_SIOCGIFBR(r3, 0x8940, 0x0) 16:36:15 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a024400", 0x33a) 16:36:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) sendfile(0xffffffffffffffff, r0, &(0x7f0000000280)=0xfffffffffffff000, 0x1ff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000010140d0700000000ff94000000000010", @ANYRESHEX, @ANYRES64], 0x3c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') socket$tipc(0x1e, 0x2, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="110000000000000000210200000008000300f4adf9146cba5b8a7d", @ANYRES32=0x0, @ANYBLOB="08000c0100000000"], 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x40, r5, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0xda}, @NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x1}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x80, 0xffffffffffffffff}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4004801}, 0x80) sendfile(r2, r1, 0x0, 0x100000000) pipe(&(0x7f0000003e40)={0xffffffffffffffff}) getsockopt$bt_sco_SCO_CONNINFO(r6, 0x11, 0x2, &(0x7f0000003e80)=""/114, &(0x7f0000003f00)=0x72) 16:36:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3b00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[], 0x1}}, 0xde229f3565a5f4ce) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={r7}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400)={0x2, 0xeea, 0x0, 0x6, 0x8, 0x5, 0x7f, 0x7, r7}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400)={r7}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r7}, &(0x7f0000000280)=0x8) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r5, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$AUDIT_SET_FEATURE(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x3fa, 0x300, 0x70bd29, 0x25dfdbfc, {0x1, 0x0, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40040800}, 0x11) [ 766.377013][T11041] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:36:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3b01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 766.572705][ T27] audit: type=1804 audit(1594658175.615:1384): pid=11046 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/582/cgroup.controllers" dev="sda1" ino=16384 res=1 [ 766.601346][T11049] bond45: (slave bridge27): Enslaving as a backup interface with an up link 16:36:15 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a025a00", 0x33a) 16:36:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3b02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 766.656521][T11062] bond45 (unregistering): (slave bridge27): Releasing backup interface 16:36:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3b03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3c00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 766.966990][T11062] bond45 (unregistering): Released all slaves [ 767.036482][T11045] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 16:36:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3c01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 767.136541][T11101] __nla_validate_parse: 7 callbacks suppressed [ 767.136551][T11101] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 767.189021][T11041] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:36:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3c02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 767.276525][T11062] bond45: (slave bridge28): Enslaving as a backup interface with an up link [ 767.292099][T11081] bond45 (unregistering): (slave bridge28): Releasing backup interface [ 767.325664][ T8802] tipc: TX() has been purged, node left! [ 767.453200][T11081] bond45 (unregistering): Released all slaves 16:36:16 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$IMHOLD_L1(r0, 0x80044948, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f000000a840)={0x0, 0x4, 0x1ff}, 0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0xfffffff8}, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x14, 0x7, 0x6, 0x301}, 0x14}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000001) 16:36:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100002000) 16:36:16 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a026300", 0x33a) 16:36:16 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffdc, 0x0) 16:36:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = getgid() r3 = getpid() r4 = gettid() r5 = getuid() getgid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRESOCT, @ANYBLOB="000000001c0000520700df5600ff3545f57a0c62b0700000000001000000ea9d", @ANYRES32, @ANYRES32, @ANYRES32], 0x3c}, 0x0) r6 = gettid() r7 = getuid() r8 = getgid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32], 0x3c}, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000380)="49b9125595bf6500b2178c1848037a92893643248093d0f483f065b5751ca31d8432e4cb580ddeea8585baa446cad0cdf7e7e7a58ff1d1f95649e3a7551cabb94db785b8", 0x44}], 0x1, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r2}}}, @cred={{0x1c, 0x1, 0x2, {r3, r5, r8}}}, @rights={{0x10}}], 0x50, 0x2400c000}, 0x20000000) r9 = syz_open_procfs$namespace(r3, &(0x7f00000000c0)='ns/time_for_children\x00') sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r9}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="00000000ff0d3bce5eaa0000000000000000"], 0x1}}, 0x0) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r10, r1, 0x0, 0x100000000) 16:36:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3c03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 767.664546][T11262] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 767.674238][ T27] audit: type=1804 audit(1594658176.715:1385): pid=11252 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/583/cgroup.controllers" dev="sda1" ino=16365 res=1 16:36:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3d00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 767.791651][ T27] audit: type=1804 audit(1594658176.765:1386): pid=11257 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/541/cgroup.controllers" dev="sda1" ino=16382 res=1 16:36:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.swap.current\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x82051, r0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket(0x3, 0x6, 0x1ff) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000100)={0x4009, 0x7f, 0x4, 0x8}) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100002000) 16:36:16 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a026900", 0x33a) 16:36:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3d01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 767.934890][ T27] audit: type=1804 audit(1594658176.795:1387): pid=11258 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/543/cgroup.controllers" dev="sda1" ino=16384 res=1 16:36:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000040)=""/2, &(0x7f00000000c0)=0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000250000000e0001006e657464657673696d0000004f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB], 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) [ 767.995428][T11275] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd00007118540000000000c3640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe0a5daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0866b75690152af27711f0cbb9c06018d21bf3f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6f68ee841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcfd1c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8b5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9c867aee17deecf747f3497e1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f449a2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb51ed4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f73960a9d5ce557523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a322091022cf5b814d9b9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93adc0231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa219fc69a44143f0d731de418e9fd82a8c4661caea674b19242d1840d047882f640ea248457288c5ffb63e853da03ff5c0475c3c04a0295bd9"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r3, 0x86, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = accept4$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @loopback}, 0xffffffffffffffff, 0x80000) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000380)={0x3ff, 0x1, 0xe2, 0x5, 0x8}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r4}, 0xc) sendfile(r2, r1, 0x0, 0x100002000) [ 768.090315][ T27] audit: type=1804 audit(1594658176.795:1388): pid=11258 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/543/cgroup.controllers" dev="sda1" ino=16384 res=1 16:36:17 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x6, [0x6, 0xb2cb, 0x5, 0xfff7, 0x6, 0x2b1]}, 0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x10401}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 16:36:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3d02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:17 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a02ba03", 0x33a) [ 768.238085][ T27] audit: type=1804 audit(1594658177.205:1389): pid=11263 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/541/cgroup.controllers" dev="sda1" ino=16382 res=1 [ 768.265656][T11282] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 768.276018][T11290] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 768.292641][T11282] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 768.400653][ T27] audit: type=1804 audit(1594658177.275:1390): pid=11282 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/584/cgroup.controllers" dev="sda1" ino=16363 res=1 16:36:17 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffdc, 0x0) 16:36:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3d03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:17 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a02d003", 0x33a) [ 768.557424][ T27] audit: type=1804 audit(1594658177.355:1391): pid=11285 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/545/cgroup.controllers" dev="sda1" ino=16371 res=1 [ 768.608706][T11301] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3e00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:17 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020202", 0x33a) 16:36:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3e01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="24000000070601040000000000ef000000000092e2dfe154672a64741388b30008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$tipc(r3, &(0x7f0000000100)=@name, &(0x7f0000000140)=0x10) sendfile(r2, r1, 0x0, 0x100002000) [ 768.783414][T11310] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:17 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = accept4$unix(r0, &(0x7f0000000180), &(0x7f0000000200)=0x6e, 0x800) sendfile(r1, r2, 0x0, 0x3) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r1, 0x1, 0x53, &(0x7f0000000040)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000000c0)=0x2c) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="28000000040601e5ca8d2363c816b9075e397b2cf54cab977de91b40e8ed8e36cba4982960f4e14f0a600929c613a940069b77c38d83b55badb26adc194f324378338926ed56679e5041c4e557b50b86bb5969"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r0, 0x0, 0x100000000) 16:36:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3e02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 769.052302][ T27] audit: type=1804 audit(1594658178.095:1392): pid=11320 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/546/cgroup.controllers" dev="sda1" ino=16383 res=1 16:36:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x24, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x8, 0xc, 0x0, 0x0, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r6, r5, 0x0, 0x100000001) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r8, r7, 0x0, 0x100000001) 16:36:18 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020203", 0x33a) 16:36:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f00003f2000/0x3000)=nil, 0x3000, 0x2, 0x1010, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) [ 769.278226][T11329] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 769.440209][ T27] audit: type=1804 audit(1594658178.486:1393): pid=11330 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/543/cgroup.controllers" dev="sda1" ino=16371 res=1 16:36:18 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 16:36:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3e03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:18 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020204", 0x33a) 16:36:18 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000100)={@loopback, @remote}, &(0x7f0000000140)=0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$SIOCPNDELRESOURCE(r4, 0x89ef, &(0x7f0000000240)=0x5) sendfile(r3, r2, 0x0, 0x100002000) [ 769.621349][T11344] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3f00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:18 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020205", 0x33a) 16:36:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x24, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x8, 0xc, 0x0, 0x0, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r6, r5, 0x0, 0x100000001) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r8, r7, 0x0, 0x100000001) 16:36:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3f01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 769.892949][T11353] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. 16:36:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x800000, 0x28011, 0xffffffffffffffff, 0x4000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000100)) sendfile(r2, r1, 0x0, 0x100002000) 16:36:19 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020206", 0x33a) 16:36:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3f02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:19 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020207", 0x33a) 16:36:19 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 16:36:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3f03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4000}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:19 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020208", 0x33a) 16:36:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x7, 0x10}, &(0x7f0000000400)=0xc) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_FLUSH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000001240)={0x560, r3, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xe4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8f9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8460}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf5b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x802}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x651}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xd4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffc1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x53d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x101}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x91a0, @private2}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'macvlan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_NODE={0x48, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3f, 0x4, {'gcm(aes)\x00', 0x17, "db4c1832fa795a7fd7b475f6138e0c229721ad56668bdf"}}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xb4, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0xffffffed, 0x2, 0xf1fd}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8}]}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb60}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA={0x4c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x20, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xca}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}, @TIPC_NLA_NODE={0x220, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xb7, 0x3, "72f7157112ac664e08ee414538cdff9e17edfdf609fd8385160104ad38e253c49565e360796fdb34e167fa49c2396fbebf8e6701fe9bfeba70bfc4ac3f0955dae88483913dac2612439c9976f761f8144657ba9cd72b406951c04b058bfb2ce6c267177f1bc80aca6804e42351f8cbad3da4aeb09346e7f353cb585e157f81727e8d80de9ba6ede6a7260c59d1a2a4deb88730a72a64aeedec1bc9d777a87bf97181687fc09f37165166b2db1cb29e0c472db7"}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "30452b1b20c4698c993f97bfabfb43f93030ee4abf9db700e1051e8b661b984422"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "d2586ba3d69c0f38099f020b13adab64147976eb83120d171fd49e31b45af07c9b53a0df"}}, @TIPC_NLA_NODE_ID={0x67, 0x3, "79c41038284d40eecc3c8dc1888d410e13616e9681c4aa2fd5fdee2ad60b24ba37afb3f7384cda87e604a6327514135dd9249b9c0fb3c2868e32be545e0df733c1c6346edaa94fd127544d5286f3ca68179444ff7140ad170ff7ea10f8233d936e5be5"}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "629c421a0ac283dfa86d4c5780ba82b3e0a189e83eec39085d39b0edc90911483b"}}]}]}, 0x560}, 0x1, 0x0, 0x0, 0x810}, 0x24080000) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x100000000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f00000004c0)={{0x3a, @multicast1, 0x4e22, 0x1, 'sh\x00', 0x20, 0xff, 0x30}, {@rand_addr=0x64010100, 0x4e21, 0x0, 0x4310, 0x9, 0x5}}, 0x44) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000240)={r5}) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)) 16:36:19 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020209", 0x33a) [ 770.951330][T11392] tipc: All keys are flushed! 16:36:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x24, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x8, 0xc, 0x0, 0x0, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r6, r5, 0x0, 0x100000001) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r8, r7, 0x0, 0x100000001) 16:36:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4001}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000000706010400000000000008000640000903ff0500010007000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x20048005}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) 16:36:20 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a02020a", 0x33a) 16:36:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x64, r3, 0x536ae464467e3e0b, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x64}}, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, r3, 0x8, 0x0, 0x80, {}, [{@pci={{0x0, 0x1, 'pci\x00'}, {0x0, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0xfffffffffffffe67}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000000) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x50000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0xac, 0x0, 0x701, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_SECCTX={0x21, 0x7, 'system_u:object_r:tmpfs_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0xac}, 0x1, 0x0, 0x0, 0x4001}, 0x24004840) 16:36:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4002}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:20 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400379b9fb61b47", 0xc}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) bind(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 16:36:20 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a02020c", 0x33a) 16:36:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4003}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4100}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:20 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a02020e", 0x33a) [ 771.644310][ T27] kauditd_printk_skb: 15 callbacks suppressed [ 771.644324][ T27] audit: type=1804 audit(1594658180.696:1409): pid=11411 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/545/cgroup.controllers" dev="sda1" ino=16374 res=1 16:36:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4101}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 771.832460][ T27] audit: type=1804 audit(1594658180.816:1410): pid=11432 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/545/cgroup.controllers" dev="sda1" ino=16374 res=1 16:36:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYRESDEC=0x0], 0x1}}, 0x44) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) 16:36:21 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a02020f", 0x33a) 16:36:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYRESHEX=r0], 0x1}, 0x1, 0x0, 0x0, 0x40801}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r6, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff30000000000000000e1ff", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB="140012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x2c, 0x0, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x1) sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0b3e0000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000700", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000"], 0x64}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)={0xcc, r5, 0x200, 0x70bd26, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}]}, 0xcc}}, 0xadf5fd8824a630bd) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r7, r1, 0x0, 0x100000000) 16:36:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x24, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x8, 0xc, 0x0, 0x0, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r6, r5, 0x0, 0x100000001) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r8, r7, 0x0, 0x100000001) 16:36:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4102}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4103}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 772.241185][T11449] __nla_validate_parse: 9 callbacks suppressed [ 772.241195][T11449] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 772.322647][ T27] audit: type=1804 audit(1594658181.366:1411): pid=11448 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir512006169/syzkaller.c0qiLe/589/cgroup.controllers" dev="sda1" ino=16380 res=1 16:36:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x7, 0x10}, &(0x7f0000000400)=0xc) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_FLUSH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000001240)={0x560, r3, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xe4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8f9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8460}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf5b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x802}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x651}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xd4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffc1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x53d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x101}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x91a0, @private2}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'macvlan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_NODE={0x48, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3f, 0x4, {'gcm(aes)\x00', 0x17, "db4c1832fa795a7fd7b475f6138e0c229721ad56668bdf"}}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xb4, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0xffffffed, 0x2, 0xf1fd}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8}]}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb60}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA={0x4c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x20, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xca}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}, @TIPC_NLA_NODE={0x220, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xb7, 0x3, "72f7157112ac664e08ee414538cdff9e17edfdf609fd8385160104ad38e253c49565e360796fdb34e167fa49c2396fbebf8e6701fe9bfeba70bfc4ac3f0955dae88483913dac2612439c9976f761f8144657ba9cd72b406951c04b058bfb2ce6c267177f1bc80aca6804e42351f8cbad3da4aeb09346e7f353cb585e157f81727e8d80de9ba6ede6a7260c59d1a2a4deb88730a72a64aeedec1bc9d777a87bf97181687fc09f37165166b2db1cb29e0c472db7"}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "30452b1b20c4698c993f97bfabfb43f93030ee4abf9db700e1051e8b661b984422"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "d2586ba3d69c0f38099f020b13adab64147976eb83120d171fd49e31b45af07c9b53a0df"}}, @TIPC_NLA_NODE_ID={0x67, 0x3, "79c41038284d40eecc3c8dc1888d410e13616e9681c4aa2fd5fdee2ad60b24ba37afb3f7384cda87e604a6327514135dd9249b9c0fb3c2868e32be545e0df733c1c6346edaa94fd127544d5286f3ca68179444ff7140ad170ff7ea10f8233d936e5be5"}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "629c421a0ac283dfa86d4c5780ba82b3e0a189e83eec39085d39b0edc90911483b"}}]}]}, 0x560}, 0x1, 0x0, 0x0, 0x810}, 0x24080000) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000040601"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x100000000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0x9effffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f00000004c0)={{0x3a, @multicast1, 0x4e22, 0x1, 'sh\x00', 0x20, 0xff, 0x30}, {@rand_addr=0x64010100, 0x4e21, 0x0, 0x4310, 0x9, 0x5}}, 0x44) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000240)={r5}) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)) [ 772.445395][ T27] audit: type=1804 audit(1594658181.406:1412): pid=11447 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/550/cgroup.controllers" dev="sda1" ino=16379 res=1 16:36:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4200}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 16:36:21 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbfcf720", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000640104801300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003c00078008f80100000000000800010000000000080003000000000008000300000000000800020000000000080003000000000008000300000000002c00078008000200000000000800020000000000080401000d0000000800040000000000080003000000000034000780080003000000000008000200000000000800030000000000080004000000000008000300000000000800010000000000440007800800030000000000080003000000000008000300030000000800010000000000080004000000000008000200000000000800020000000000080001000000000024000780080002000000000000000100000000000800020000000000080001000000000034000780080004000000000008000400000000000800030000100000080004000000000008000200000000000800030000000000cc0001802c00040014000100020000000000000000000000000000001400020002000000ffffffff0000000000000000380004001400010202f17a2aed00ab14e700000000000000200002000a0000000000000000000000000000000000000000000000000000000d0001007564703a73797a30000000000e00010069623a64756d6d79300000003c0002800800010000000000080003000000000008000200000000000800020000000000080001001200000008000200000000000800010000000000080003"], 0x3}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020210", 0x33a) [ 772.638242][ T27] audit: type=1804 audit(1594658181.556:1413): pid=11458 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/546/cgroup.controllers" dev="sda1" ino=16353 res=1 16:36:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4201}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 772.803044][ T27] audit: type=1804 audit(1594658181.846:1414): pid=11468 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/546/cgroup.controllers" dev="sda1" ino=16353 res=1 16:36:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x10, 0x81800) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}, 0x1, 0x0, 0x0, 0x4040840}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) 16:36:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4202}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 772.941764][ T27] audit: type=1804 audit(1594658181.936:1415): pid=11471 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir344413900/syzkaller.JbT7Ab/546/cgroup.controllers" dev="sda1" ino=16353 res=1 [ 773.181456][ T27] audit: type=1804 audit(1594658182.226:1416): pid=11476 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir957052790/syzkaller.7dn70r/551/cgroup.controllers" dev="sda1" ino=16384 res=1 [ 773.364214][T11448] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 773.399712][T11464] netlink: 246 bytes leftover after parsing attributes in process `syz-executor.2'. [ 773.874396][T11448] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 774.078248][T11448] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 774.363260][T11448] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 774.426086][T11448] ================================================================== [ 774.434416][T11448] BUG: KASAN: use-after-free in devlink_health_reporter_destroy+0x184/0x1d0 [ 774.443080][T11448] Read of size 8 at addr ffff8880911fb420 by task syz-executor.0/11448 [ 774.451292][T11448] [ 774.453628][T11448] CPU: 1 PID: 11448 Comm: syz-executor.0 Not tainted 5.8.0-rc4-syzkaller #0 [ 774.462279][T11448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.472312][T11448] Call Trace: [ 774.475606][T11448] dump_stack+0x18f/0x20d [ 774.479920][T11448] ? devlink_health_reporter_destroy+0x184/0x1d0 [ 774.486228][T11448] ? devlink_health_reporter_destroy+0x184/0x1d0 [ 774.492541][T11448] print_address_description.constprop.0.cold+0xae/0x436 [ 774.499554][T11448] ? lockdep_hardirqs_off+0x66/0xa0 [ 774.504756][T11448] ? vprintk_func+0x97/0x1a6 [ 774.509350][T11448] ? devlink_health_reporter_destroy+0x184/0x1d0 [ 774.515663][T11448] kasan_report.cold+0x1f/0x37 [ 774.520443][T11448] ? devlink_health_reporter_destroy+0x184/0x1d0 [ 774.526757][T11448] devlink_health_reporter_destroy+0x184/0x1d0 [ 774.532897][T11448] nsim_dev_health_exit+0x8b/0xe0 [ 774.537904][T11448] nsim_dev_reload_destroy+0x132/0x1e0 [ 774.543345][T11448] nsim_dev_reload_down+0x6e/0xd0 [ 774.548355][T11448] devlink_reload+0xc1/0x3a0 [ 774.552931][T11448] devlink_nl_cmd_reload+0x386/0x880 [ 774.558199][T11448] ? devlink_port_attrs_pci_vf_set+0x260/0x260 [ 774.564338][T11448] genl_rcv_msg+0x61d/0x980 [ 774.568829][T11448] ? genl_family_rcv_msg_attrs_parse.isra.0+0x250/0x250 [ 774.575768][T11448] ? lock_release+0x8d0/0x8d0 [ 774.580425][T11448] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 774.585689][T11448] ? do_raw_spin_unlock+0x171/0x230 [ 774.590872][T11448] netlink_rcv_skb+0x15a/0x430 [ 774.595623][T11448] ? genl_family_rcv_msg_attrs_parse.isra.0+0x250/0x250 [ 774.602543][T11448] ? netlink_ack+0xa10/0xa10 [ 774.607124][T11448] genl_rcv+0x24/0x40 [ 774.611100][T11448] netlink_unicast+0x533/0x7d0 [ 774.615865][T11448] ? netlink_attachskb+0x810/0x810 [ 774.621666][T11448] ? _copy_from_iter_full+0x247/0x890 [ 774.627023][T11448] ? __phys_addr+0x9a/0x110 [ 774.631518][T11448] ? __phys_addr_symbol+0x2c/0x70 [ 774.636528][T11448] ? __check_object_size+0x171/0x3e4 [ 774.641801][T11448] netlink_sendmsg+0x856/0xd90 [ 774.646558][T11448] ? netlink_unicast+0x7d0/0x7d0 [ 774.651488][T11448] ? netlink_unicast+0x7d0/0x7d0 [ 774.656500][T11448] sock_sendmsg+0xcf/0x120 [ 774.660904][T11448] ____sys_sendmsg+0x6e8/0x810 [ 774.665652][T11448] ? kernel_sendmsg+0x50/0x50 [ 774.670310][T11448] ? do_recvmmsg+0x6d0/0x6d0 [ 774.674885][T11448] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 774.680846][T11448] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 774.686806][T11448] ? lock_acquire+0x1f1/0xad0 [ 774.691467][T11448] ___sys_sendmsg+0xf3/0x170 [ 774.696045][T11448] ? sendmsg_copy_msghdr+0x160/0x160 [ 774.701324][T11448] ? __fget_files+0x272/0x400 [ 774.705986][T11448] ? lock_downgrade+0x820/0x820 [ 774.710816][T11448] ? find_held_lock+0x2d/0x110 [ 774.715575][T11448] ? __might_fault+0x11f/0x1d0 [ 774.720324][T11448] ? __fget_files+0x294/0x400 [ 774.724986][T11448] ? __fget_light+0xea/0x280 [ 774.729564][T11448] __sys_sendmsg+0xe5/0x1b0 [ 774.734061][T11448] ? __sys_sendmsg_sock+0xb0/0xb0 [ 774.739070][T11448] ? __x64_sys_futex+0x382/0x4e0 [ 774.744000][T11448] ? do_syscall_64+0x1c/0xe0 [ 774.748574][T11448] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 774.754547][T11448] do_syscall_64+0x60/0xe0 [ 774.758991][T11448] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 774.764864][T11448] RIP: 0033:0x45cba9 [ 774.768732][T11448] Code: Bad RIP value. [ 774.772777][T11448] RSP: 002b:00007f65c65d9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 774.781183][T11448] RAX: ffffffffffffffda RBX: 00000000004fef40 RCX: 000000000045cba9 [ 774.789149][T11448] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000006 [ 774.797101][T11448] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 774.805070][T11448] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 774.813028][T11448] R13: 0000000000000949 R14: 00000000004cc1da R15: 00007f65c65da6d4 [ 774.820994][T11448] [ 774.823303][T11448] Allocated by task 6836: [ 774.827706][T11448] save_stack+0x1b/0x40 [ 774.831844][T11448] __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 774.837461][T11448] kmem_cache_alloc_trace+0x14f/0x2d0 [ 774.842834][T11448] __devlink_health_reporter_create+0x91/0x2f0 [ 774.848967][T11448] devlink_health_reporter_create+0xa1/0x1d0 [ 774.854927][T11448] nsim_dev_health_init+0x95/0x3a0 [ 774.860015][T11448] nsim_dev_probe+0xada/0xf80 [ 774.864672][T11448] really_probe+0x282/0x8a0 [ 774.869155][T11448] driver_probe_device+0xfe/0x1d0 [ 774.874158][T11448] __device_attach_driver+0x1c2/0x220 [ 774.879512][T11448] bus_for_each_drv+0x15f/0x1e0 [ 774.884340][T11448] __device_attach+0x28d/0x3f0 [ 774.889084][T11448] bus_probe_device+0x1e4/0x290 [ 774.893915][T11448] device_add+0xacf/0x1b00 [ 774.898316][T11448] new_device_store+0x374/0x5c0 [ 774.903145][T11448] bus_attr_store+0x72/0xa0 [ 774.907631][T11448] sysfs_kf_write+0x110/0x160 [ 774.912284][T11448] kernfs_fop_write+0x268/0x490 [ 774.917115][T11448] vfs_write+0x2b0/0x6b0 [ 774.921347][T11448] ksys_write+0x12d/0x250 [ 774.925654][T11448] do_syscall_64+0x60/0xe0 [ 774.930053][T11448] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 774.936028][T11448] [ 774.938349][T11448] Freed by task 11448: [ 774.942414][T11448] save_stack+0x1b/0x40 [ 774.946561][T11448] __kasan_slab_free+0xf5/0x140 [ 774.951391][T11448] kfree+0x103/0x2c0 [ 774.955267][T11448] devlink_health_reporter_put+0xb7/0xf0 [ 774.960879][T11448] devlink_health_reporter_destroy+0x143/0x1d0 [ 774.967011][T11448] nsim_dev_health_exit+0x8b/0xe0 [ 774.972016][T11448] nsim_dev_reload_destroy+0x132/0x1e0 [ 774.977453][T11448] nsim_dev_reload_down+0x6e/0xd0 [ 774.982457][T11448] devlink_reload+0xc1/0x3a0 [ 774.987025][T11448] devlink_nl_cmd_reload+0x386/0x880 [ 774.992302][T11448] genl_rcv_msg+0x61d/0x980 [ 774.996785][T11448] netlink_rcv_skb+0x15a/0x430 [ 775.001526][T11448] genl_rcv+0x24/0x40 [ 775.005486][T11448] netlink_unicast+0x533/0x7d0 [ 775.010239][T11448] netlink_sendmsg+0x856/0xd90 [ 775.014982][T11448] sock_sendmsg+0xcf/0x120 [ 775.019377][T11448] ____sys_sendmsg+0x6e8/0x810 [ 775.024121][T11448] ___sys_sendmsg+0xf3/0x170 [ 775.028692][T11448] __sys_sendmsg+0xe5/0x1b0 [ 775.033189][T11448] do_syscall_64+0x60/0xe0 [ 775.037591][T11448] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 775.043454][T11448] [ 775.045765][T11448] The buggy address belongs to the object at ffff8880911fb400 [ 775.045765][T11448] which belongs to the cache kmalloc-512 of size 512 [ 775.059881][T11448] The buggy address is located 32 bytes inside of [ 775.059881][T11448] 512-byte region [ffff8880911fb400, ffff8880911fb600) [ 775.073055][T11448] The buggy address belongs to the page: [ 775.078690][T11448] page:ffffea0002447ec0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 [ 775.087777][T11448] flags: 0xfffe0000000200(slab) [ 775.092630][T11448] raw: 00fffe0000000200 ffffea000280b588 ffffea000288f008 ffff8880aa000a80 [ 775.101403][T11448] raw: 0000000000000000 ffff8880911fb000 0000000100000004 0000000000000000 [ 775.110923][T11448] page dumped because: kasan: bad access detected [ 775.117315][T11448] [ 775.119621][T11448] Memory state around the buggy address: [ 775.125231][T11448] ffff8880911fb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 775.133273][T11448] ffff8880911fb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 775.141580][T11448] >ffff8880911fb400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 775.149621][T11448] ^ [ 775.154712][T11448] ffff8880911fb480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 775.162769][T11448] ffff8880911fb500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 775.170820][T11448] ================================================================== [ 775.178863][T11448] Disabling lock debugging due to kernel taint [ 775.204070][T11448] Kernel panic - not syncing: panic_on_warn set ... [ 775.210667][T11448] CPU: 0 PID: 11448 Comm: syz-executor.0 Tainted: G B 5.8.0-rc4-syzkaller #0 [ 775.220718][T11448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.230770][T11448] Call Trace: [ 775.234061][T11448] dump_stack+0x18f/0x20d [ 775.238395][T11448] ? devlink_health_reporter_destroy+0xc0/0x1d0 [ 775.244635][T11448] panic+0x2e3/0x75c [ 775.248530][T11448] ? __warn_printk+0xf3/0xf3 [ 775.254079][T11448] ? preempt_schedule_common+0x59/0xc0 [ 775.259526][T11448] ? devlink_health_reporter_destroy+0x184/0x1d0 [ 775.265830][T11448] ? preempt_schedule_thunk+0x16/0x18 [ 775.271190][T11448] ? trace_hardirqs_on+0x55/0x220 [ 775.276202][T11448] ? devlink_health_reporter_destroy+0x184/0x1d0 [ 775.282548][T11448] ? devlink_health_reporter_destroy+0x184/0x1d0 [ 775.289029][T11448] end_report+0x4d/0x53 [ 775.293270][T11448] kasan_report.cold+0xd/0x37 [ 775.297943][T11448] ? devlink_health_reporter_destroy+0x184/0x1d0 [ 775.304444][T11448] devlink_health_reporter_destroy+0x184/0x1d0 [ 775.310599][T11448] nsim_dev_health_exit+0x8b/0xe0 [ 775.315603][T11448] nsim_dev_reload_destroy+0x132/0x1e0 [ 775.321049][T11448] nsim_dev_reload_down+0x6e/0xd0 [ 775.326050][T11448] devlink_reload+0xc1/0x3a0 [ 775.330632][T11448] devlink_nl_cmd_reload+0x386/0x880 [ 775.335901][T11448] ? devlink_port_attrs_pci_vf_set+0x260/0x260 [ 775.342040][T11448] genl_rcv_msg+0x61d/0x980 [ 775.346533][T11448] ? genl_family_rcv_msg_attrs_parse.isra.0+0x250/0x250 [ 775.353459][T11448] ? lock_release+0x8d0/0x8d0 [ 775.358123][T11448] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 775.363381][T11448] ? do_raw_spin_unlock+0x171/0x230 [ 775.368557][T11448] netlink_rcv_skb+0x15a/0x430 [ 775.373309][T11448] ? genl_family_rcv_msg_attrs_parse.isra.0+0x250/0x250 [ 775.380232][T11448] ? netlink_ack+0xa10/0xa10 [ 775.384802][T11448] genl_rcv+0x24/0x40 [ 775.388856][T11448] netlink_unicast+0x533/0x7d0 [ 775.393606][T11448] ? netlink_attachskb+0x810/0x810 [ 775.398704][T11448] ? _copy_from_iter_full+0x247/0x890 [ 775.404063][T11448] ? __phys_addr+0x9a/0x110 [ 775.408551][T11448] ? __phys_addr_symbol+0x2c/0x70 [ 775.413567][T11448] ? __check_object_size+0x171/0x3e4 [ 775.418840][T11448] netlink_sendmsg+0x856/0xd90 [ 775.423582][T11448] ? netlink_unicast+0x7d0/0x7d0 [ 775.428497][T11448] ? netlink_unicast+0x7d0/0x7d0 [ 775.433419][T11448] sock_sendmsg+0xcf/0x120 [ 775.437848][T11448] ____sys_sendmsg+0x6e8/0x810 [ 775.442593][T11448] ? kernel_sendmsg+0x50/0x50 [ 775.447245][T11448] ? do_recvmmsg+0x6d0/0x6d0 [ 775.451813][T11448] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 775.457797][T11448] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 775.463768][T11448] ? lock_acquire+0x1f1/0xad0 [ 775.468469][T11448] ___sys_sendmsg+0xf3/0x170 [ 775.473054][T11448] ? sendmsg_copy_msghdr+0x160/0x160 [ 775.478321][T11448] ? __fget_files+0x272/0x400 [ 775.482999][T11448] ? lock_downgrade+0x820/0x820 [ 775.487830][T11448] ? find_held_lock+0x2d/0x110 [ 775.493533][T11448] ? __might_fault+0x11f/0x1d0 [ 775.498287][T11448] ? __fget_files+0x294/0x400 [ 775.502969][T11448] ? __fget_light+0xea/0x280 [ 775.507554][T11448] __sys_sendmsg+0xe5/0x1b0 [ 775.512035][T11448] ? __sys_sendmsg_sock+0xb0/0xb0 [ 775.517067][T11448] ? __x64_sys_futex+0x382/0x4e0 [ 775.521994][T11448] ? do_syscall_64+0x1c/0xe0 [ 775.526562][T11448] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 775.532525][T11448] do_syscall_64+0x60/0xe0 [ 775.536923][T11448] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 775.542791][T11448] RIP: 0033:0x45cba9 [ 775.546676][T11448] Code: Bad RIP value. [ 775.551064][T11448] RSP: 002b:00007f65c65d9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 775.559448][T11448] RAX: ffffffffffffffda RBX: 00000000004fef40 RCX: 000000000045cba9 [ 775.567422][T11448] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000006 [ 775.575388][T11448] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 775.583388][T11448] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 775.591340][T11448] R13: 0000000000000949 R14: 00000000004cc1da R15: 00007f65c65da6d4 [ 775.601734][T11448] Kernel Offset: disabled [ 775.606062][T11448] Rebooting in 86400 seconds..